Mar 17 18:48:21.117083 kernel: Linux version 5.15.179-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Mar 17 17:12:34 -00 2025 Mar 17 18:48:21.117137 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:48:21.117157 kernel: BIOS-provided physical RAM map: Mar 17 18:48:21.117171 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Mar 17 18:48:21.117184 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Mar 17 18:48:21.117198 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Mar 17 18:48:21.117216 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Mar 17 18:48:21.117230 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Mar 17 18:48:21.117244 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd277fff] usable Mar 17 18:48:21.117258 kernel: BIOS-e820: [mem 0x00000000bd278000-0x00000000bd281fff] ACPI data Mar 17 18:48:21.117272 kernel: BIOS-e820: [mem 0x00000000bd282000-0x00000000bf8ecfff] usable Mar 17 18:48:21.117286 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Mar 17 18:48:21.117300 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Mar 17 18:48:21.117314 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Mar 17 18:48:21.117334 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Mar 17 18:48:21.117349 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Mar 17 18:48:21.117362 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Mar 17 18:48:21.117376 kernel: NX (Execute Disable) protection: active Mar 17 18:48:21.117390 kernel: efi: EFI v2.70 by EDK II Mar 17 18:48:21.117404 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd278018 Mar 17 18:48:21.117418 kernel: random: crng init done Mar 17 18:48:21.117433 kernel: SMBIOS 2.4 present. Mar 17 18:48:21.117451 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Mar 17 18:48:21.117465 kernel: Hypervisor detected: KVM Mar 17 18:48:21.117479 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Mar 17 18:48:21.117513 kernel: kvm-clock: cpu 0, msr 1e419a001, primary cpu clock Mar 17 18:48:21.117528 kernel: kvm-clock: using sched offset of 13583527028 cycles Mar 17 18:48:21.117545 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Mar 17 18:48:21.117559 kernel: tsc: Detected 2299.998 MHz processor Mar 17 18:48:21.117575 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 17 18:48:21.117591 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 17 18:48:21.117605 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Mar 17 18:48:21.117624 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 17 18:48:21.117637 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Mar 17 18:48:21.117673 kernel: Using GB pages for direct mapping Mar 17 18:48:21.117688 kernel: Secure boot disabled Mar 17 18:48:21.117704 kernel: ACPI: Early table checksum verification disabled Mar 17 18:48:21.117719 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Mar 17 18:48:21.117735 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Mar 17 18:48:21.117751 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Mar 17 18:48:21.117777 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Mar 17 18:48:21.117794 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Mar 17 18:48:21.117811 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Mar 17 18:48:21.117826 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Mar 17 18:48:21.117845 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Mar 17 18:48:21.117861 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Mar 17 18:48:21.117881 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Mar 17 18:48:21.117897 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Mar 17 18:48:21.117914 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Mar 17 18:48:21.117931 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Mar 17 18:48:21.117947 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Mar 17 18:48:21.117964 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Mar 17 18:48:21.117981 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Mar 17 18:48:21.117998 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Mar 17 18:48:21.118014 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Mar 17 18:48:21.118045 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Mar 17 18:48:21.118061 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Mar 17 18:48:21.118077 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Mar 17 18:48:21.118093 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Mar 17 18:48:21.118110 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Mar 17 18:48:21.118134 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Mar 17 18:48:21.118151 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Mar 17 18:48:21.118168 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Mar 17 18:48:21.118185 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Mar 17 18:48:21.118205 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Mar 17 18:48:21.118220 kernel: Zone ranges: Mar 17 18:48:21.118235 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 17 18:48:21.118251 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 17 18:48:21.118268 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Mar 17 18:48:21.118284 kernel: Movable zone start for each node Mar 17 18:48:21.118301 kernel: Early memory node ranges Mar 17 18:48:21.118318 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Mar 17 18:48:21.118334 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Mar 17 18:48:21.118355 kernel: node 0: [mem 0x0000000000100000-0x00000000bd277fff] Mar 17 18:48:21.118372 kernel: node 0: [mem 0x00000000bd282000-0x00000000bf8ecfff] Mar 17 18:48:21.118388 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Mar 17 18:48:21.118404 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Mar 17 18:48:21.118420 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Mar 17 18:48:21.118437 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 17 18:48:21.118454 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Mar 17 18:48:21.118471 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Mar 17 18:48:21.118488 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Mar 17 18:48:21.118523 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Mar 17 18:48:21.118540 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Mar 17 18:48:21.118556 kernel: ACPI: PM-Timer IO Port: 0xb008 Mar 17 18:48:21.118573 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Mar 17 18:48:21.118590 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Mar 17 18:48:21.118606 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Mar 17 18:48:21.118620 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 17 18:48:21.118636 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Mar 17 18:48:21.118653 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Mar 17 18:48:21.118673 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 17 18:48:21.118690 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Mar 17 18:48:21.118706 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Mar 17 18:48:21.118723 kernel: Booting paravirtualized kernel on KVM Mar 17 18:48:21.118740 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Mar 17 18:48:21.118757 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Mar 17 18:48:21.118774 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Mar 17 18:48:21.118794 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Mar 17 18:48:21.118810 kernel: pcpu-alloc: [0] 0 1 Mar 17 18:48:21.118831 kernel: kvm-guest: PV spinlocks enabled Mar 17 18:48:21.118847 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Mar 17 18:48:21.118864 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Mar 17 18:48:21.118880 kernel: Policy zone: Normal Mar 17 18:48:21.118899 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:48:21.118916 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Mar 17 18:48:21.118933 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 17 18:48:21.118948 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Mar 17 18:48:21.118964 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 17 18:48:21.118985 kernel: Memory: 7515412K/7860544K available (12294K kernel code, 2278K rwdata, 13724K rodata, 47472K init, 4108K bss, 344872K reserved, 0K cma-reserved) Mar 17 18:48:21.119000 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Mar 17 18:48:21.119016 kernel: Kernel/User page tables isolation: enabled Mar 17 18:48:21.119032 kernel: ftrace: allocating 34580 entries in 136 pages Mar 17 18:48:21.119049 kernel: ftrace: allocated 136 pages with 2 groups Mar 17 18:48:21.119066 kernel: rcu: Hierarchical RCU implementation. Mar 17 18:48:21.119084 kernel: rcu: RCU event tracing is enabled. Mar 17 18:48:21.119101 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Mar 17 18:48:21.119132 kernel: Rude variant of Tasks RCU enabled. Mar 17 18:48:21.119162 kernel: Tracing variant of Tasks RCU enabled. Mar 17 18:48:21.119180 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 17 18:48:21.119202 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Mar 17 18:48:21.119219 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Mar 17 18:48:21.119237 kernel: Console: colour dummy device 80x25 Mar 17 18:48:21.119254 kernel: printk: console [ttyS0] enabled Mar 17 18:48:21.119272 kernel: ACPI: Core revision 20210730 Mar 17 18:48:21.119290 kernel: APIC: Switch to symmetric I/O mode setup Mar 17 18:48:21.119308 kernel: x2apic enabled Mar 17 18:48:21.119329 kernel: Switched APIC routing to physical x2apic. Mar 17 18:48:21.119347 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Mar 17 18:48:21.119364 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Mar 17 18:48:21.119381 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Mar 17 18:48:21.119398 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Mar 17 18:48:21.119431 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Mar 17 18:48:21.119449 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 17 18:48:21.119471 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Mar 17 18:48:21.119488 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Mar 17 18:48:21.119527 kernel: Spectre V2 : Mitigation: IBRS Mar 17 18:48:21.119545 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 17 18:48:21.119563 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 17 18:48:21.119581 kernel: RETBleed: Mitigation: IBRS Mar 17 18:48:21.119599 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 17 18:48:21.119617 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Mar 17 18:48:21.119634 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Mar 17 18:48:21.119656 kernel: MDS: Mitigation: Clear CPU buffers Mar 17 18:48:21.119674 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Mar 17 18:48:21.119692 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 17 18:48:21.119710 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 17 18:48:21.119728 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 17 18:48:21.119745 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 17 18:48:21.119763 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Mar 17 18:48:21.119781 kernel: Freeing SMP alternatives memory: 32K Mar 17 18:48:21.119799 kernel: pid_max: default: 32768 minimum: 301 Mar 17 18:48:21.119821 kernel: LSM: Security Framework initializing Mar 17 18:48:21.119839 kernel: SELinux: Initializing. Mar 17 18:48:21.119857 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 17 18:48:21.119874 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 17 18:48:21.119891 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Mar 17 18:48:21.119909 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Mar 17 18:48:21.119926 kernel: signal: max sigframe size: 1776 Mar 17 18:48:21.119944 kernel: rcu: Hierarchical SRCU implementation. Mar 17 18:48:21.119962 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Mar 17 18:48:21.119984 kernel: smp: Bringing up secondary CPUs ... Mar 17 18:48:21.120001 kernel: x86: Booting SMP configuration: Mar 17 18:48:21.120018 kernel: .... node #0, CPUs: #1 Mar 17 18:48:21.120036 kernel: kvm-clock: cpu 1, msr 1e419a041, secondary cpu clock Mar 17 18:48:21.120054 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Mar 17 18:48:21.120074 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Mar 17 18:48:21.120091 kernel: smp: Brought up 1 node, 2 CPUs Mar 17 18:48:21.120109 kernel: smpboot: Max logical packages: 1 Mar 17 18:48:21.120139 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Mar 17 18:48:21.120157 kernel: devtmpfs: initialized Mar 17 18:48:21.120175 kernel: x86/mm: Memory block size: 128MB Mar 17 18:48:21.120193 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Mar 17 18:48:21.120211 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 17 18:48:21.120229 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Mar 17 18:48:21.120247 kernel: pinctrl core: initialized pinctrl subsystem Mar 17 18:48:21.120264 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 17 18:48:21.120282 kernel: audit: initializing netlink subsys (disabled) Mar 17 18:48:21.120304 kernel: audit: type=2000 audit(1742237299.841:1): state=initialized audit_enabled=0 res=1 Mar 17 18:48:21.120321 kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 17 18:48:21.120338 kernel: thermal_sys: Registered thermal governor 'user_space' Mar 17 18:48:21.120355 kernel: cpuidle: using governor menu Mar 17 18:48:21.120373 kernel: ACPI: bus type PCI registered Mar 17 18:48:21.120391 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 17 18:48:21.120408 kernel: dca service started, version 1.12.1 Mar 17 18:48:21.120426 kernel: PCI: Using configuration type 1 for base access Mar 17 18:48:21.120444 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 17 18:48:21.120466 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Mar 17 18:48:21.120483 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Mar 17 18:48:21.120513 kernel: ACPI: Added _OSI(Module Device) Mar 17 18:48:21.120530 kernel: ACPI: Added _OSI(Processor Device) Mar 17 18:48:21.120548 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 17 18:48:21.120570 kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 17 18:48:21.120589 kernel: ACPI: Added _OSI(Linux-Dell-Video) Mar 17 18:48:21.120606 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Mar 17 18:48:21.120623 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Mar 17 18:48:21.120645 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Mar 17 18:48:21.120662 kernel: ACPI: Interpreter enabled Mar 17 18:48:21.120680 kernel: ACPI: PM: (supports S0 S3 S5) Mar 17 18:48:21.120698 kernel: ACPI: Using IOAPIC for interrupt routing Mar 17 18:48:21.120716 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 17 18:48:21.120733 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Mar 17 18:48:21.120750 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Mar 17 18:48:21.120994 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Mar 17 18:48:21.121192 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Mar 17 18:48:21.121215 kernel: PCI host bridge to bus 0000:00 Mar 17 18:48:21.121383 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 17 18:48:21.121601 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 17 18:48:21.121752 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Mar 17 18:48:21.121892 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Mar 17 18:48:21.128641 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Mar 17 18:48:21.128886 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Mar 17 18:48:21.129070 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Mar 17 18:48:21.129249 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Mar 17 18:48:21.129459 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Mar 17 18:48:21.129663 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Mar 17 18:48:21.129831 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Mar 17 18:48:21.130072 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Mar 17 18:48:21.130254 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Mar 17 18:48:21.130419 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Mar 17 18:48:21.133276 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Mar 17 18:48:21.133482 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Mar 17 18:48:21.133685 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Mar 17 18:48:21.133839 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Mar 17 18:48:21.133877 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Mar 17 18:48:21.133896 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 17 18:48:21.133914 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 17 18:48:21.133930 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 17 18:48:21.133948 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Mar 17 18:48:21.133965 kernel: iommu: Default domain type: Translated Mar 17 18:48:21.133983 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 17 18:48:21.134001 kernel: vgaarb: loaded Mar 17 18:48:21.134018 kernel: pps_core: LinuxPPS API ver. 1 registered Mar 17 18:48:21.134040 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 17 18:48:21.134058 kernel: PTP clock support registered Mar 17 18:48:21.134075 kernel: Registered efivars operations Mar 17 18:48:21.134091 kernel: PCI: Using ACPI for IRQ routing Mar 17 18:48:21.134108 kernel: PCI: pci_cache_line_size set to 64 bytes Mar 17 18:48:21.134124 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Mar 17 18:48:21.134139 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Mar 17 18:48:21.134156 kernel: e820: reserve RAM buffer [mem 0xbd278000-0xbfffffff] Mar 17 18:48:21.134173 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Mar 17 18:48:21.134193 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Mar 17 18:48:21.134210 kernel: clocksource: Switched to clocksource kvm-clock Mar 17 18:48:21.134228 kernel: VFS: Disk quotas dquot_6.6.0 Mar 17 18:48:21.134244 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 17 18:48:21.134262 kernel: pnp: PnP ACPI init Mar 17 18:48:21.134279 kernel: pnp: PnP ACPI: found 7 devices Mar 17 18:48:21.134296 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 17 18:48:21.134314 kernel: NET: Registered PF_INET protocol family Mar 17 18:48:21.134331 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 17 18:48:21.134352 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Mar 17 18:48:21.134370 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 17 18:48:21.134388 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Mar 17 18:48:21.134405 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Mar 17 18:48:21.134422 kernel: TCP: Hash tables configured (established 65536 bind 65536) Mar 17 18:48:21.134439 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 17 18:48:21.134456 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 17 18:48:21.134472 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 17 18:48:21.134507 kernel: NET: Registered PF_XDP protocol family Mar 17 18:48:21.144977 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 17 18:48:21.145135 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 17 18:48:21.145282 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Mar 17 18:48:21.145429 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Mar 17 18:48:21.145622 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Mar 17 18:48:21.145647 kernel: PCI: CLS 0 bytes, default 64 Mar 17 18:48:21.145672 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 17 18:48:21.145690 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Mar 17 18:48:21.145707 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Mar 17 18:48:21.145724 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Mar 17 18:48:21.145741 kernel: clocksource: Switched to clocksource tsc Mar 17 18:48:21.145758 kernel: Initialise system trusted keyrings Mar 17 18:48:21.145775 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Mar 17 18:48:21.145793 kernel: Key type asymmetric registered Mar 17 18:48:21.145809 kernel: Asymmetric key parser 'x509' registered Mar 17 18:48:21.145829 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Mar 17 18:48:21.145846 kernel: io scheduler mq-deadline registered Mar 17 18:48:21.145863 kernel: io scheduler kyber registered Mar 17 18:48:21.145888 kernel: io scheduler bfq registered Mar 17 18:48:21.145905 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Mar 17 18:48:21.145923 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Mar 17 18:48:21.146093 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Mar 17 18:48:21.146116 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Mar 17 18:48:21.146274 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Mar 17 18:48:21.146299 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Mar 17 18:48:21.146449 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Mar 17 18:48:21.146470 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 17 18:48:21.146486 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Mar 17 18:48:21.161863 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Mar 17 18:48:21.161888 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Mar 17 18:48:21.161908 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Mar 17 18:48:21.162194 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Mar 17 18:48:21.162231 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Mar 17 18:48:21.162251 kernel: i8042: Warning: Keylock active Mar 17 18:48:21.162270 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 17 18:48:21.162290 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 17 18:48:21.163868 kernel: rtc_cmos 00:00: RTC can wake from S4 Mar 17 18:48:21.164133 kernel: rtc_cmos 00:00: registered as rtc0 Mar 17 18:48:21.164346 kernel: rtc_cmos 00:00: setting system clock to 2025-03-17T18:48:20 UTC (1742237300) Mar 17 18:48:21.167606 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Mar 17 18:48:21.167652 kernel: intel_pstate: CPU model not supported Mar 17 18:48:21.167672 kernel: pstore: Registered efi as persistent store backend Mar 17 18:48:21.167690 kernel: NET: Registered PF_INET6 protocol family Mar 17 18:48:21.167717 kernel: Segment Routing with IPv6 Mar 17 18:48:21.167735 kernel: In-situ OAM (IOAM) with IPv6 Mar 17 18:48:21.167753 kernel: NET: Registered PF_PACKET protocol family Mar 17 18:48:21.167771 kernel: Key type dns_resolver registered Mar 17 18:48:21.167789 kernel: IPI shorthand broadcast: enabled Mar 17 18:48:21.167808 kernel: sched_clock: Marking stable (747209434, 161077415)->(983613535, -75326686) Mar 17 18:48:21.167829 kernel: registered taskstats version 1 Mar 17 18:48:21.167848 kernel: Loading compiled-in X.509 certificates Mar 17 18:48:21.167865 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Mar 17 18:48:21.167884 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.179-flatcar: d5b956bbabb2d386c0246a969032c0de9eaa8220' Mar 17 18:48:21.167902 kernel: Key type .fscrypt registered Mar 17 18:48:21.167920 kernel: Key type fscrypt-provisioning registered Mar 17 18:48:21.167938 kernel: pstore: Using crash dump compression: deflate Mar 17 18:48:21.167956 kernel: ima: Allocated hash algorithm: sha1 Mar 17 18:48:21.167974 kernel: ima: No architecture policies found Mar 17 18:48:21.167995 kernel: clk: Disabling unused clocks Mar 17 18:48:21.168013 kernel: Freeing unused kernel image (initmem) memory: 47472K Mar 17 18:48:21.168044 kernel: Write protecting the kernel read-only data: 28672k Mar 17 18:48:21.168062 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Mar 17 18:48:21.168079 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Mar 17 18:48:21.168097 kernel: Run /init as init process Mar 17 18:48:21.168122 kernel: with arguments: Mar 17 18:48:21.168140 kernel: /init Mar 17 18:48:21.168158 kernel: with environment: Mar 17 18:48:21.168179 kernel: HOME=/ Mar 17 18:48:21.168196 kernel: TERM=linux Mar 17 18:48:21.168213 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Mar 17 18:48:21.168235 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:48:21.168257 systemd[1]: Detected virtualization kvm. Mar 17 18:48:21.168276 systemd[1]: Detected architecture x86-64. Mar 17 18:48:21.168294 systemd[1]: Running in initrd. Mar 17 18:48:21.168316 systemd[1]: No hostname configured, using default hostname. Mar 17 18:48:21.168335 systemd[1]: Hostname set to . Mar 17 18:48:21.168354 systemd[1]: Initializing machine ID from VM UUID. Mar 17 18:48:21.168373 systemd[1]: Queued start job for default target initrd.target. Mar 17 18:48:21.168391 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:48:21.168409 systemd[1]: Reached target cryptsetup.target. Mar 17 18:48:21.168427 systemd[1]: Reached target paths.target. Mar 17 18:48:21.168445 systemd[1]: Reached target slices.target. Mar 17 18:48:21.168467 systemd[1]: Reached target swap.target. Mar 17 18:48:21.168485 systemd[1]: Reached target timers.target. Mar 17 18:48:21.172833 systemd[1]: Listening on iscsid.socket. Mar 17 18:48:21.172856 systemd[1]: Listening on iscsiuio.socket. Mar 17 18:48:21.172876 systemd[1]: Listening on systemd-journald-audit.socket. Mar 17 18:48:21.172895 systemd[1]: Listening on systemd-journald-dev-log.socket. Mar 17 18:48:21.172914 systemd[1]: Listening on systemd-journald.socket. Mar 17 18:48:21.172933 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:48:21.172959 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:48:21.172979 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:48:21.173016 systemd[1]: Reached target sockets.target. Mar 17 18:48:21.173040 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:48:21.173059 systemd[1]: Finished network-cleanup.service. Mar 17 18:48:21.173078 systemd[1]: Starting systemd-fsck-usr.service... Mar 17 18:48:21.173106 systemd[1]: Starting systemd-journald.service... Mar 17 18:48:21.173129 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:48:21.173148 systemd[1]: Starting systemd-resolved.service... Mar 17 18:48:21.173167 systemd[1]: Starting systemd-vconsole-setup.service... Mar 17 18:48:21.173186 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:48:21.173206 kernel: audit: type=1130 audit(1742237301.137:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.173226 systemd[1]: Finished systemd-fsck-usr.service. Mar 17 18:48:21.173246 kernel: audit: type=1130 audit(1742237301.147:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.173264 systemd[1]: Finished systemd-vconsole-setup.service. Mar 17 18:48:21.173288 kernel: audit: type=1130 audit(1742237301.154:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.173307 systemd[1]: Starting dracut-cmdline-ask.service... Mar 17 18:48:21.173326 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 18:48:21.173350 systemd-journald[190]: Journal started Mar 17 18:48:21.173465 systemd-journald[190]: Runtime Journal (/run/log/journal/66368909b283aa4f0b9ae2eaa0fe7692) is 8.0M, max 148.8M, 140.8M free. Mar 17 18:48:21.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.143013 systemd-modules-load[191]: Inserted module 'overlay' Mar 17 18:48:21.204405 systemd[1]: Started systemd-journald.service. Mar 17 18:48:21.204477 kernel: audit: type=1130 audit(1742237301.189:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.204533 kernel: audit: type=1130 audit(1742237301.199:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.200829 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 18:48:21.213530 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 17 18:48:21.219603 systemd[1]: Finished dracut-cmdline-ask.service. Mar 17 18:48:21.236436 kernel: Bridge firewalling registered Mar 17 18:48:21.236475 kernel: audit: type=1130 audit(1742237301.222:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.223108 systemd-modules-load[191]: Inserted module 'br_netfilter' Mar 17 18:48:21.224986 systemd[1]: Starting dracut-cmdline.service... Mar 17 18:48:21.251326 systemd-resolved[192]: Positive Trust Anchors: Mar 17 18:48:21.252481 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:48:21.252564 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:48:21.270632 kernel: SCSI subsystem initialized Mar 17 18:48:21.270670 dracut-cmdline[205]: dracut-dracut-053 Mar 17 18:48:21.270670 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:48:21.259684 systemd-resolved[192]: Defaulting to hostname 'linux'. Mar 17 18:48:21.261469 systemd[1]: Started systemd-resolved.service. Mar 17 18:48:21.295191 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 17 18:48:21.295232 kernel: device-mapper: uevent: version 1.0.3 Mar 17 18:48:21.298061 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Mar 17 18:48:21.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.301816 systemd[1]: Reached target nss-lookup.target. Mar 17 18:48:21.312652 kernel: audit: type=1130 audit(1742237301.300:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.309184 systemd-modules-load[191]: Inserted module 'dm_multipath' Mar 17 18:48:21.310155 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:48:21.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.323785 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:48:21.334842 kernel: audit: type=1130 audit(1742237301.321:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.342901 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:48:21.355675 kernel: audit: type=1130 audit(1742237301.346:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.370529 kernel: Loading iSCSI transport class v2.0-870. Mar 17 18:48:21.391533 kernel: iscsi: registered transport (tcp) Mar 17 18:48:21.419726 kernel: iscsi: registered transport (qla4xxx) Mar 17 18:48:21.419810 kernel: QLogic iSCSI HBA Driver Mar 17 18:48:21.467694 systemd[1]: Finished dracut-cmdline.service. Mar 17 18:48:21.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.470133 systemd[1]: Starting dracut-pre-udev.service... Mar 17 18:48:21.533562 kernel: raid6: avx2x4 gen() 18232 MB/s Mar 17 18:48:21.554542 kernel: raid6: avx2x4 xor() 6719 MB/s Mar 17 18:48:21.575586 kernel: raid6: avx2x2 gen() 18213 MB/s Mar 17 18:48:21.596578 kernel: raid6: avx2x2 xor() 18462 MB/s Mar 17 18:48:21.617575 kernel: raid6: avx2x1 gen() 13545 MB/s Mar 17 18:48:21.638581 kernel: raid6: avx2x1 xor() 16062 MB/s Mar 17 18:48:21.659553 kernel: raid6: sse2x4 gen() 10981 MB/s Mar 17 18:48:21.680544 kernel: raid6: sse2x4 xor() 6560 MB/s Mar 17 18:48:21.701570 kernel: raid6: sse2x2 gen() 11985 MB/s Mar 17 18:48:21.722569 kernel: raid6: sse2x2 xor() 7417 MB/s Mar 17 18:48:21.743553 kernel: raid6: sse2x1 gen() 10114 MB/s Mar 17 18:48:21.769538 kernel: raid6: sse2x1 xor() 5277 MB/s Mar 17 18:48:21.769594 kernel: raid6: using algorithm avx2x4 gen() 18232 MB/s Mar 17 18:48:21.769622 kernel: raid6: .... xor() 6719 MB/s, rmw enabled Mar 17 18:48:21.774603 kernel: raid6: using avx2x2 recovery algorithm Mar 17 18:48:21.800540 kernel: xor: automatically using best checksumming function avx Mar 17 18:48:21.913537 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Mar 17 18:48:21.925785 systemd[1]: Finished dracut-pre-udev.service. Mar 17 18:48:21.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.939000 audit: BPF prog-id=7 op=LOAD Mar 17 18:48:21.940000 audit: BPF prog-id=8 op=LOAD Mar 17 18:48:21.942245 systemd[1]: Starting systemd-udevd.service... Mar 17 18:48:21.959472 systemd-udevd[387]: Using default interface naming scheme 'v252'. Mar 17 18:48:21.967404 systemd[1]: Started systemd-udevd.service. Mar 17 18:48:21.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:21.985891 systemd[1]: Starting dracut-pre-trigger.service... Mar 17 18:48:22.003742 dracut-pre-trigger[393]: rd.md=0: removing MD RAID activation Mar 17 18:48:22.038684 systemd[1]: Finished dracut-pre-trigger.service. Mar 17 18:48:22.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:22.039919 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:48:22.107086 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:48:22.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:22.186523 kernel: cryptd: max_cpu_qlen set to 1000 Mar 17 18:48:22.276805 kernel: AVX2 version of gcm_enc/dec engaged. Mar 17 18:48:22.276895 kernel: AES CTR mode by8 optimization enabled Mar 17 18:48:22.285306 kernel: scsi host0: Virtio SCSI HBA Mar 17 18:48:22.323517 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Mar 17 18:48:22.395252 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Mar 17 18:48:22.455373 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Mar 17 18:48:22.455628 kernel: sd 0:0:1:0: [sda] Write Protect is off Mar 17 18:48:22.455842 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Mar 17 18:48:22.456076 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Mar 17 18:48:22.456277 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 17 18:48:22.456303 kernel: GPT:17805311 != 25165823 Mar 17 18:48:22.456318 kernel: GPT:Alternate GPT header not at the end of the disk. Mar 17 18:48:22.456331 kernel: GPT:17805311 != 25165823 Mar 17 18:48:22.456345 kernel: GPT: Use GNU Parted to correct GPT errors. Mar 17 18:48:22.456358 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:48:22.456373 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Mar 17 18:48:22.504865 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Mar 17 18:48:22.534810 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (424) Mar 17 18:48:22.505198 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Mar 17 18:48:22.549757 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Mar 17 18:48:22.578062 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Mar 17 18:48:22.596781 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:48:22.598862 systemd[1]: Starting disk-uuid.service... Mar 17 18:48:22.632822 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:48:22.633296 disk-uuid[504]: Primary Header is updated. Mar 17 18:48:22.633296 disk-uuid[504]: Secondary Entries is updated. Mar 17 18:48:22.633296 disk-uuid[504]: Secondary Header is updated. Mar 17 18:48:23.669096 disk-uuid[505]: The operation has completed successfully. Mar 17 18:48:23.677652 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:48:23.737834 systemd[1]: disk-uuid.service: Deactivated successfully. Mar 17 18:48:23.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:23.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:23.737984 systemd[1]: Finished disk-uuid.service. Mar 17 18:48:23.760745 systemd[1]: Starting verity-setup.service... Mar 17 18:48:23.788569 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Mar 17 18:48:23.877309 systemd[1]: Found device dev-mapper-usr.device. Mar 17 18:48:23.879881 systemd[1]: Mounting sysusr-usr.mount... Mar 17 18:48:23.899202 systemd[1]: Finished verity-setup.service. Mar 17 18:48:23.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:23.986968 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 18:48:23.987570 systemd[1]: Mounted sysusr-usr.mount. Mar 17 18:48:23.987958 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Mar 17 18:48:24.046806 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:48:24.046852 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:48:24.046875 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:48:24.046903 kernel: BTRFS info (device sda6): enabling ssd optimizations Mar 17 18:48:23.988912 systemd[1]: Starting ignition-setup.service... Mar 17 18:48:24.008812 systemd[1]: Starting parse-ip-for-networkd.service... Mar 17 18:48:24.064481 systemd[1]: mnt-oem.mount: Deactivated successfully. Mar 17 18:48:24.089808 systemd[1]: Finished ignition-setup.service. Mar 17 18:48:24.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.101187 systemd[1]: Starting ignition-fetch-offline.service... Mar 17 18:48:24.146346 systemd[1]: Finished parse-ip-for-networkd.service. Mar 17 18:48:24.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.154000 audit: BPF prog-id=9 op=LOAD Mar 17 18:48:24.157226 systemd[1]: Starting systemd-networkd.service... Mar 17 18:48:24.190448 systemd-networkd[679]: lo: Link UP Mar 17 18:48:24.190461 systemd-networkd[679]: lo: Gained carrier Mar 17 18:48:24.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.191242 systemd-networkd[679]: Enumeration completed Mar 17 18:48:24.191389 systemd[1]: Started systemd-networkd.service. Mar 17 18:48:24.191811 systemd-networkd[679]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:48:24.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.193869 systemd-networkd[679]: eth0: Link UP Mar 17 18:48:24.275760 iscsid[688]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:48:24.275760 iscsid[688]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Mar 17 18:48:24.275760 iscsid[688]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Mar 17 18:48:24.275760 iscsid[688]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Mar 17 18:48:24.275760 iscsid[688]: If using hardware iscsi like qla4xxx this message can be ignored. Mar 17 18:48:24.275760 iscsid[688]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:48:24.275760 iscsid[688]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Mar 17 18:48:24.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.193877 systemd-networkd[679]: eth0: Gained carrier Mar 17 18:48:24.412679 ignition[639]: Ignition 2.14.0 Mar 17 18:48:24.203697 systemd-networkd[679]: eth0: DHCPv4 address 10.128.0.90/32, gateway 10.128.0.1 acquired from 169.254.169.254 Mar 17 18:48:24.412691 ignition[639]: Stage: fetch-offline Mar 17 18:48:24.206861 systemd[1]: Reached target network.target. Mar 17 18:48:24.412767 ignition[639]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:48:24.222770 systemd[1]: Starting iscsiuio.service... Mar 17 18:48:24.412808 ignition[639]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:48:24.235888 systemd[1]: Started iscsiuio.service. Mar 17 18:48:24.439298 ignition[639]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:48:24.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.251202 systemd[1]: Starting iscsid.service... Mar 17 18:48:24.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.439516 ignition[639]: parsed url from cmdline: "" Mar 17 18:48:24.267830 systemd[1]: Started iscsid.service. Mar 17 18:48:24.439524 ignition[639]: no config URL provided Mar 17 18:48:24.284103 systemd[1]: Starting dracut-initqueue.service... Mar 17 18:48:24.439535 ignition[639]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:48:24.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.357050 systemd[1]: Finished dracut-initqueue.service. Mar 17 18:48:24.439551 ignition[639]: no config at "/usr/lib/ignition/user.ign" Mar 17 18:48:24.367062 systemd[1]: Reached target remote-fs-pre.target. Mar 17 18:48:24.439564 ignition[639]: failed to fetch config: resource requires networking Mar 17 18:48:24.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.393707 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:48:24.439949 ignition[639]: Ignition finished successfully Mar 17 18:48:24.411830 systemd[1]: Reached target remote-fs.target. Mar 17 18:48:24.528118 ignition[703]: Ignition 2.14.0 Mar 17 18:48:24.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.458826 systemd[1]: Starting dracut-pre-mount.service... Mar 17 18:48:24.528127 ignition[703]: Stage: fetch Mar 17 18:48:24.482203 systemd[1]: Finished ignition-fetch-offline.service. Mar 17 18:48:24.528274 ignition[703]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:48:24.497135 systemd[1]: Finished dracut-pre-mount.service. Mar 17 18:48:24.528313 ignition[703]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:48:24.516039 systemd[1]: Starting ignition-fetch.service... Mar 17 18:48:24.536179 ignition[703]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:48:24.546548 unknown[703]: fetched base config from "system" Mar 17 18:48:24.536381 ignition[703]: parsed url from cmdline: "" Mar 17 18:48:24.546614 unknown[703]: fetched base config from "system" Mar 17 18:48:24.536388 ignition[703]: no config URL provided Mar 17 18:48:24.546623 unknown[703]: fetched user config from "gcp" Mar 17 18:48:24.536395 ignition[703]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:48:24.548849 systemd[1]: Finished ignition-fetch.service. Mar 17 18:48:24.536406 ignition[703]: no config at "/usr/lib/ignition/user.ign" Mar 17 18:48:24.561113 systemd[1]: Starting ignition-kargs.service... Mar 17 18:48:24.536443 ignition[703]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Mar 17 18:48:24.585031 systemd[1]: Finished ignition-kargs.service. Mar 17 18:48:24.543399 ignition[703]: GET result: OK Mar 17 18:48:24.608104 systemd[1]: Starting ignition-disks.service... Mar 17 18:48:24.543451 ignition[703]: parsing config with SHA512: 0353cc4d9d97379083bb1051b2140a29a0ffa4a026d92936a64cf61a0be9c3692b5bb4a26cac08d336cf5ecae32d37725bc8df9d90390e8b3227fad42d3a60b3 Mar 17 18:48:24.640038 systemd[1]: Finished ignition-disks.service. Mar 17 18:48:24.547194 ignition[703]: fetch: fetch complete Mar 17 18:48:24.655007 systemd[1]: Reached target initrd-root-device.target. Mar 17 18:48:24.547202 ignition[703]: fetch: fetch passed Mar 17 18:48:24.668671 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:48:24.547255 ignition[703]: Ignition finished successfully Mar 17 18:48:24.682698 systemd[1]: Reached target local-fs.target. Mar 17 18:48:24.573812 ignition[709]: Ignition 2.14.0 Mar 17 18:48:24.693716 systemd[1]: Reached target sysinit.target. Mar 17 18:48:24.573822 ignition[709]: Stage: kargs Mar 17 18:48:24.707702 systemd[1]: Reached target basic.target. Mar 17 18:48:24.573964 ignition[709]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:48:24.724958 systemd[1]: Starting systemd-fsck-root.service... Mar 17 18:48:24.573995 ignition[709]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:48:24.581417 ignition[709]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:48:24.582606 ignition[709]: kargs: kargs passed Mar 17 18:48:24.582668 ignition[709]: Ignition finished successfully Mar 17 18:48:24.621324 ignition[715]: Ignition 2.14.0 Mar 17 18:48:24.621332 ignition[715]: Stage: disks Mar 17 18:48:24.621631 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:48:24.621660 ignition[715]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:48:24.628897 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:48:24.629947 ignition[715]: disks: disks passed Mar 17 18:48:24.629997 ignition[715]: Ignition finished successfully Mar 17 18:48:24.780650 systemd-fsck[723]: ROOT: clean, 623/1628000 files, 124059/1617920 blocks Mar 17 18:48:24.956446 systemd[1]: Finished systemd-fsck-root.service. Mar 17 18:48:24.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:24.957646 systemd[1]: Mounting sysroot.mount... Mar 17 18:48:24.991704 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 18:48:24.987403 systemd[1]: Mounted sysroot.mount. Mar 17 18:48:24.999028 systemd[1]: Reached target initrd-root-fs.target. Mar 17 18:48:25.019933 systemd[1]: Mounting sysroot-usr.mount... Mar 17 18:48:25.031260 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Mar 17 18:48:25.031317 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Mar 17 18:48:25.031353 systemd[1]: Reached target ignition-diskful.target. Mar 17 18:48:25.119988 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (729) Mar 17 18:48:25.120034 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:48:25.120059 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:48:25.120083 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:48:25.047037 systemd[1]: Mounted sysroot-usr.mount. Mar 17 18:48:25.070316 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:48:25.147292 initrd-setup-root[734]: cut: /sysroot/etc/passwd: No such file or directory Mar 17 18:48:25.157682 kernel: BTRFS info (device sda6): enabling ssd optimizations Mar 17 18:48:25.095767 systemd[1]: Starting initrd-setup-root.service... Mar 17 18:48:25.171743 initrd-setup-root[758]: cut: /sysroot/etc/group: No such file or directory Mar 17 18:48:25.153946 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:48:25.190670 initrd-setup-root[766]: cut: /sysroot/etc/shadow: No such file or directory Mar 17 18:48:25.200674 initrd-setup-root[776]: cut: /sysroot/etc/gshadow: No such file or directory Mar 17 18:48:25.230444 systemd[1]: Finished initrd-setup-root.service. Mar 17 18:48:25.271699 kernel: kauditd_printk_skb: 23 callbacks suppressed Mar 17 18:48:25.271743 kernel: audit: type=1130 audit(1742237305.229:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:25.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:25.231977 systemd[1]: Starting ignition-mount.service... Mar 17 18:48:25.279867 systemd[1]: Starting sysroot-boot.service... Mar 17 18:48:25.293923 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Mar 17 18:48:25.294076 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Mar 17 18:48:25.321664 ignition[795]: INFO : Ignition 2.14.0 Mar 17 18:48:25.321664 ignition[795]: INFO : Stage: mount Mar 17 18:48:25.321664 ignition[795]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:48:25.321664 ignition[795]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:48:25.451800 kernel: audit: type=1130 audit(1742237305.327:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:25.451858 kernel: audit: type=1130 audit(1742237305.360:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:25.451875 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (804) Mar 17 18:48:25.451889 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:48:25.451904 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:48:25.451918 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:48:25.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:25.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:25.323973 systemd[1]: Finished sysroot-boot.service. Mar 17 18:48:25.471793 kernel: BTRFS info (device sda6): enabling ssd optimizations Mar 17 18:48:25.471857 ignition[795]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:48:25.471857 ignition[795]: INFO : mount: mount passed Mar 17 18:48:25.471857 ignition[795]: INFO : Ignition finished successfully Mar 17 18:48:25.329197 systemd[1]: Finished ignition-mount.service. Mar 17 18:48:25.363362 systemd[1]: Starting ignition-files.service... Mar 17 18:48:25.404080 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:48:25.529651 ignition[823]: INFO : Ignition 2.14.0 Mar 17 18:48:25.529651 ignition[823]: INFO : Stage: files Mar 17 18:48:25.529651 ignition[823]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:48:25.529651 ignition[823]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:48:25.529651 ignition[823]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:48:25.529651 ignition[823]: DEBUG : files: compiled without relabeling support, skipping Mar 17 18:48:25.529651 ignition[823]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Mar 17 18:48:25.529651 ignition[823]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Mar 17 18:48:25.529651 ignition[823]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Mar 17 18:48:25.529651 ignition[823]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Mar 17 18:48:25.529651 ignition[823]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Mar 17 18:48:25.529651 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Mar 17 18:48:25.529651 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:48:25.467730 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:48:25.694700 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem373094436" Mar 17 18:48:25.694700 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem373094436": device or resource busy Mar 17 18:48:25.694700 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem373094436", trying btrfs: device or resource busy Mar 17 18:48:25.694700 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem373094436" Mar 17 18:48:25.694700 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem373094436" Mar 17 18:48:25.694700 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem373094436" Mar 17 18:48:25.694700 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem373094436" Mar 17 18:48:25.694700 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Mar 17 18:48:25.694700 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Mar 17 18:48:25.694700 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:48:25.694700 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1320503314" Mar 17 18:48:25.694700 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1320503314": device or resource busy Mar 17 18:48:25.694700 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1320503314", trying btrfs: device or resource busy Mar 17 18:48:25.694700 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1320503314" Mar 17 18:48:25.521187 unknown[823]: wrote ssh authorized keys file for user: core Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1320503314" Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem1320503314" Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem1320503314" Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:48:25.943699 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3961193297" Mar 17 18:48:25.943699 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3961193297": device or resource busy Mar 17 18:48:26.179670 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3961193297", trying btrfs: device or resource busy Mar 17 18:48:26.179670 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3961193297" Mar 17 18:48:26.179670 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3961193297" Mar 17 18:48:26.179670 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem3961193297" Mar 17 18:48:26.179670 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem3961193297" Mar 17 18:48:26.179670 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Mar 17 18:48:26.179670 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Mar 17 18:48:26.179670 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:48:26.179670 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3275755847" Mar 17 18:48:26.179670 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3275755847": device or resource busy Mar 17 18:48:26.179670 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3275755847", trying btrfs: device or resource busy Mar 17 18:48:26.179670 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3275755847" Mar 17 18:48:26.179670 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3275755847" Mar 17 18:48:26.179670 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem3275755847" Mar 17 18:48:26.429696 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem3275755847" Mar 17 18:48:26.429696 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Mar 17 18:48:26.429696 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 18:48:26.429696 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 Mar 17 18:48:26.429696 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET result: OK Mar 17 18:48:26.245663 systemd-networkd[679]: eth0: Gained IPv6LL Mar 17 18:48:26.566628 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 18:48:26.566628 ignition[823]: INFO : files: op(17): [started] processing unit "coreos-metadata-sshkeys@.service" Mar 17 18:48:26.623733 kernel: audit: type=1130 audit(1742237306.584:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.623874 ignition[823]: INFO : files: op(17): [finished] processing unit "coreos-metadata-sshkeys@.service" Mar 17 18:48:26.623874 ignition[823]: INFO : files: op(18): [started] processing unit "oem-gce.service" Mar 17 18:48:26.623874 ignition[823]: INFO : files: op(18): [finished] processing unit "oem-gce.service" Mar 17 18:48:26.623874 ignition[823]: INFO : files: op(19): [started] processing unit "oem-gce-enable-oslogin.service" Mar 17 18:48:26.623874 ignition[823]: INFO : files: op(19): [finished] processing unit "oem-gce-enable-oslogin.service" Mar 17 18:48:26.623874 ignition[823]: INFO : files: op(1a): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 18:48:26.623874 ignition[823]: INFO : files: op(1a): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 18:48:26.623874 ignition[823]: INFO : files: op(1b): [started] setting preset to enabled for "oem-gce.service" Mar 17 18:48:26.623874 ignition[823]: INFO : files: op(1b): [finished] setting preset to enabled for "oem-gce.service" Mar 17 18:48:26.623874 ignition[823]: INFO : files: op(1c): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Mar 17 18:48:26.623874 ignition[823]: INFO : files: op(1c): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Mar 17 18:48:26.623874 ignition[823]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:48:26.623874 ignition[823]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:48:26.623874 ignition[823]: INFO : files: files passed Mar 17 18:48:26.623874 ignition[823]: INFO : Ignition finished successfully Mar 17 18:48:27.021701 kernel: audit: type=1130 audit(1742237306.671:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.021758 kernel: audit: type=1130 audit(1742237306.722:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.021796 kernel: audit: type=1131 audit(1742237306.722:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.021821 kernel: audit: type=1130 audit(1742237306.834:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.021842 kernel: audit: type=1131 audit(1742237306.834:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.021864 kernel: audit: type=1130 audit(1742237306.957:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.575615 systemd[1]: Finished ignition-files.service. Mar 17 18:48:26.595373 systemd[1]: Starting initrd-setup-root-after-ignition.service... Mar 17 18:48:27.054744 initrd-setup-root-after-ignition[846]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Mar 17 18:48:27.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.631780 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Mar 17 18:48:26.632949 systemd[1]: Starting ignition-quench.service... Mar 17 18:48:26.652061 systemd[1]: Finished initrd-setup-root-after-ignition.service. Mar 17 18:48:26.673119 systemd[1]: ignition-quench.service: Deactivated successfully. Mar 17 18:48:26.673267 systemd[1]: Finished ignition-quench.service. Mar 17 18:48:26.723964 systemd[1]: Reached target ignition-complete.target. Mar 17 18:48:26.776896 systemd[1]: Starting initrd-parse-etc.service... Mar 17 18:48:26.817634 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 17 18:48:26.817803 systemd[1]: Finished initrd-parse-etc.service. Mar 17 18:48:26.835938 systemd[1]: Reached target initrd-fs.target. Mar 17 18:48:26.888933 systemd[1]: Reached target initrd.target. Mar 17 18:48:26.908926 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Mar 17 18:48:27.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.910087 systemd[1]: Starting dracut-pre-pivot.service... Mar 17 18:48:26.936020 systemd[1]: Finished dracut-pre-pivot.service. Mar 17 18:48:27.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:26.960206 systemd[1]: Starting initrd-cleanup.service... Mar 17 18:48:27.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.004047 systemd[1]: Stopped target nss-lookup.target. Mar 17 18:48:27.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.008016 systemd[1]: Stopped target remote-cryptsetup.target. Mar 17 18:48:27.349684 ignition[861]: INFO : Ignition 2.14.0 Mar 17 18:48:27.349684 ignition[861]: INFO : Stage: umount Mar 17 18:48:27.349684 ignition[861]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:48:27.349684 ignition[861]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Mar 17 18:48:27.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.031020 systemd[1]: Stopped target timers.target. Mar 17 18:48:27.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.439901 ignition[861]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Mar 17 18:48:27.439901 ignition[861]: INFO : umount: umount passed Mar 17 18:48:27.439901 ignition[861]: INFO : Ignition finished successfully Mar 17 18:48:27.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.044966 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 17 18:48:27.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.045184 systemd[1]: Stopped dracut-pre-pivot.service. Mar 17 18:48:27.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.063207 systemd[1]: Stopped target initrd.target. Mar 17 18:48:27.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.083871 systemd[1]: Stopped target basic.target. Mar 17 18:48:27.107894 systemd[1]: Stopped target ignition-complete.target. Mar 17 18:48:27.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.122830 systemd[1]: Stopped target ignition-diskful.target. Mar 17 18:48:27.138836 systemd[1]: Stopped target initrd-root-device.target. Mar 17 18:48:27.154857 systemd[1]: Stopped target remote-fs.target. Mar 17 18:48:27.170890 systemd[1]: Stopped target remote-fs-pre.target. Mar 17 18:48:27.186880 systemd[1]: Stopped target sysinit.target. Mar 17 18:48:27.202906 systemd[1]: Stopped target local-fs.target. Mar 17 18:48:27.220862 systemd[1]: Stopped target local-fs-pre.target. Mar 17 18:48:27.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.236854 systemd[1]: Stopped target swap.target. Mar 17 18:48:27.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.250851 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 17 18:48:27.251079 systemd[1]: Stopped dracut-pre-mount.service. Mar 17 18:48:27.266003 systemd[1]: Stopped target cryptsetup.target. Mar 17 18:48:27.284790 systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 17 18:48:27.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.285003 systemd[1]: Stopped dracut-initqueue.service. Mar 17 18:48:27.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.300981 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Mar 17 18:48:27.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.756000 audit: BPF prog-id=6 op=UNLOAD Mar 17 18:48:27.301167 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Mar 17 18:48:27.318100 systemd[1]: ignition-files.service: Deactivated successfully. Mar 17 18:48:27.318357 systemd[1]: Stopped ignition-files.service. Mar 17 18:48:27.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.334188 systemd[1]: Stopping ignition-mount.service... Mar 17 18:48:27.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.357147 systemd[1]: Stopping iscsiuio.service... Mar 17 18:48:27.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.377922 systemd[1]: Stopping sysroot-boot.service... Mar 17 18:48:27.395686 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 17 18:48:27.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.396032 systemd[1]: Stopped systemd-udev-trigger.service. Mar 17 18:48:27.404931 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 17 18:48:27.405106 systemd[1]: Stopped dracut-pre-trigger.service. Mar 17 18:48:27.436553 systemd[1]: sysroot-boot.mount: Deactivated successfully. Mar 17 18:48:27.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.437741 systemd[1]: iscsiuio.service: Deactivated successfully. Mar 17 18:48:27.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.437857 systemd[1]: Stopped iscsiuio.service. Mar 17 18:48:27.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.447317 systemd[1]: ignition-mount.service: Deactivated successfully. Mar 17 18:48:27.447431 systemd[1]: Stopped ignition-mount.service. Mar 17 18:48:27.466266 systemd[1]: sysroot-boot.service: Deactivated successfully. Mar 17 18:48:27.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.466390 systemd[1]: Stopped sysroot-boot.service. Mar 17 18:48:28.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.480350 systemd[1]: ignition-disks.service: Deactivated successfully. Mar 17 18:48:28.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.480534 systemd[1]: Stopped ignition-disks.service. Mar 17 18:48:28.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.495803 systemd[1]: ignition-kargs.service: Deactivated successfully. Mar 17 18:48:28.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:28.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:27.495897 systemd[1]: Stopped ignition-kargs.service. Mar 17 18:48:27.512824 systemd[1]: ignition-fetch.service: Deactivated successfully. Mar 17 18:48:27.512912 systemd[1]: Stopped ignition-fetch.service. Mar 17 18:48:27.527789 systemd[1]: Stopped target network.target. Mar 17 18:48:27.543700 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Mar 17 18:48:28.134700 systemd-journald[190]: Received SIGTERM from PID 1 (systemd). Mar 17 18:48:27.543823 systemd[1]: Stopped ignition-fetch-offline.service. Mar 17 18:48:28.144768 iscsid[688]: iscsid shutting down. Mar 17 18:48:27.558829 systemd[1]: Stopped target paths.target. Mar 17 18:48:27.573675 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 17 18:48:27.575615 systemd[1]: Stopped systemd-ask-password-console.path. Mar 17 18:48:27.590710 systemd[1]: Stopped target slices.target. Mar 17 18:48:27.604684 systemd[1]: Stopped target sockets.target. Mar 17 18:48:27.617747 systemd[1]: iscsid.socket: Deactivated successfully. Mar 17 18:48:27.617804 systemd[1]: Closed iscsid.socket. Mar 17 18:48:27.632760 systemd[1]: iscsiuio.socket: Deactivated successfully. Mar 17 18:48:27.632834 systemd[1]: Closed iscsiuio.socket. Mar 17 18:48:27.646720 systemd[1]: ignition-setup.service: Deactivated successfully. Mar 17 18:48:27.646817 systemd[1]: Stopped ignition-setup.service. Mar 17 18:48:27.661846 systemd[1]: initrd-setup-root.service: Deactivated successfully. Mar 17 18:48:27.661934 systemd[1]: Stopped initrd-setup-root.service. Mar 17 18:48:27.676969 systemd[1]: Stopping systemd-networkd.service... Mar 17 18:48:27.680583 systemd-networkd[679]: eth0: DHCPv6 lease lost Mar 17 18:48:27.690974 systemd[1]: Stopping systemd-resolved.service... Mar 17 18:48:27.713302 systemd[1]: systemd-resolved.service: Deactivated successfully. Mar 17 18:48:27.713437 systemd[1]: Stopped systemd-resolved.service. Mar 17 18:48:27.720606 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 18:48:27.720734 systemd[1]: Stopped systemd-networkd.service. Mar 17 18:48:27.743691 systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 17 18:48:27.743821 systemd[1]: Finished initrd-cleanup.service. Mar 17 18:48:27.758958 systemd[1]: systemd-networkd.socket: Deactivated successfully. Mar 17 18:48:27.759002 systemd[1]: Closed systemd-networkd.socket. Mar 17 18:48:27.776856 systemd[1]: Stopping network-cleanup.service... Mar 17 18:48:27.791668 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Mar 17 18:48:27.791789 systemd[1]: Stopped parse-ip-for-networkd.service. Mar 17 18:48:27.806817 systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 17 18:48:27.806904 systemd[1]: Stopped systemd-sysctl.service. Mar 17 18:48:27.821946 systemd[1]: systemd-modules-load.service: Deactivated successfully. Mar 17 18:48:27.822014 systemd[1]: Stopped systemd-modules-load.service. Mar 17 18:48:27.836935 systemd[1]: Stopping systemd-udevd.service... Mar 17 18:48:27.852404 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 17 18:48:27.853081 systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 17 18:48:27.853233 systemd[1]: Stopped systemd-udevd.service. Mar 17 18:48:27.859308 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 17 18:48:27.859408 systemd[1]: Closed systemd-udevd-control.socket. Mar 17 18:48:27.890794 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 17 18:48:27.890866 systemd[1]: Closed systemd-udevd-kernel.socket. Mar 17 18:48:27.908749 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 17 18:48:27.908849 systemd[1]: Stopped dracut-pre-udev.service. Mar 17 18:48:27.923829 systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 17 18:48:27.923909 systemd[1]: Stopped dracut-cmdline.service. Mar 17 18:48:27.939848 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Mar 17 18:48:27.939936 systemd[1]: Stopped dracut-cmdline-ask.service. Mar 17 18:48:27.956831 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Mar 17 18:48:27.979764 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Mar 17 18:48:27.979886 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Mar 17 18:48:27.994962 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 17 18:48:27.995028 systemd[1]: Stopped kmod-static-nodes.service. Mar 17 18:48:28.010898 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 17 18:48:28.010978 systemd[1]: Stopped systemd-vconsole-setup.service. Mar 17 18:48:28.027255 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Mar 17 18:48:28.027930 systemd[1]: network-cleanup.service: Deactivated successfully. Mar 17 18:48:28.028045 systemd[1]: Stopped network-cleanup.service. Mar 17 18:48:28.042162 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 17 18:48:28.042308 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Mar 17 18:48:28.059185 systemd[1]: Reached target initrd-switch-root.target. Mar 17 18:48:28.078033 systemd[1]: Starting initrd-switch-root.service... Mar 17 18:48:28.107932 systemd[1]: Switching root. Mar 17 18:48:28.154344 systemd-journald[190]: Journal stopped Mar 17 18:48:32.871862 kernel: SELinux: Class mctp_socket not defined in policy. Mar 17 18:48:32.871999 kernel: SELinux: Class anon_inode not defined in policy. Mar 17 18:48:32.872025 kernel: SELinux: the above unknown classes and permissions will be allowed Mar 17 18:48:32.872048 kernel: SELinux: policy capability network_peer_controls=1 Mar 17 18:48:32.872070 kernel: SELinux: policy capability open_perms=1 Mar 17 18:48:32.872092 kernel: SELinux: policy capability extended_socket_class=1 Mar 17 18:48:32.872125 kernel: SELinux: policy capability always_check_network=0 Mar 17 18:48:32.872158 kernel: SELinux: policy capability cgroup_seclabel=1 Mar 17 18:48:32.872180 kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 17 18:48:32.872203 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Mar 17 18:48:32.872229 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Mar 17 18:48:32.872261 systemd[1]: Successfully loaded SELinux policy in 111.116ms. Mar 17 18:48:32.872298 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.904ms. Mar 17 18:48:32.872324 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:48:32.872351 systemd[1]: Detected virtualization kvm. Mar 17 18:48:32.872375 systemd[1]: Detected architecture x86-64. Mar 17 18:48:32.872399 systemd[1]: Detected first boot. Mar 17 18:48:32.872426 systemd[1]: Initializing machine ID from VM UUID. Mar 17 18:48:32.872449 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Mar 17 18:48:32.872472 systemd[1]: Populated /etc with preset unit settings. Mar 17 18:48:32.872511 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:48:32.872544 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:48:32.872572 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:48:32.872604 kernel: kauditd_printk_skb: 51 callbacks suppressed Mar 17 18:48:32.872626 kernel: audit: type=1334 audit(1742237311.958:88): prog-id=12 op=LOAD Mar 17 18:48:32.872652 kernel: audit: type=1334 audit(1742237311.958:89): prog-id=3 op=UNLOAD Mar 17 18:48:32.872676 kernel: audit: type=1334 audit(1742237311.963:90): prog-id=13 op=LOAD Mar 17 18:48:32.872694 kernel: audit: type=1334 audit(1742237311.970:91): prog-id=14 op=LOAD Mar 17 18:48:32.872708 kernel: audit: type=1334 audit(1742237311.970:92): prog-id=4 op=UNLOAD Mar 17 18:48:32.872722 kernel: audit: type=1334 audit(1742237311.970:93): prog-id=5 op=UNLOAD Mar 17 18:48:32.872735 kernel: audit: type=1334 audit(1742237311.977:94): prog-id=15 op=LOAD Mar 17 18:48:32.872749 kernel: audit: type=1334 audit(1742237311.977:95): prog-id=12 op=UNLOAD Mar 17 18:48:32.872763 kernel: audit: type=1334 audit(1742237311.984:96): prog-id=16 op=LOAD Mar 17 18:48:32.872777 kernel: audit: type=1334 audit(1742237311.991:97): prog-id=17 op=LOAD Mar 17 18:48:32.872795 systemd[1]: iscsid.service: Deactivated successfully. Mar 17 18:48:32.872810 systemd[1]: Stopped iscsid.service. Mar 17 18:48:32.872825 systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 17 18:48:32.872839 systemd[1]: Stopped initrd-switch-root.service. Mar 17 18:48:32.872855 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 17 18:48:32.872870 systemd[1]: Created slice system-addon\x2dconfig.slice. Mar 17 18:48:32.872888 systemd[1]: Created slice system-addon\x2drun.slice. Mar 17 18:48:32.872906 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Mar 17 18:48:32.872922 systemd[1]: Created slice system-getty.slice. Mar 17 18:48:32.872936 systemd[1]: Created slice system-modprobe.slice. Mar 17 18:48:32.872952 systemd[1]: Created slice system-serial\x2dgetty.slice. Mar 17 18:48:32.872968 systemd[1]: Created slice system-system\x2dcloudinit.slice. Mar 17 18:48:32.872983 systemd[1]: Created slice system-systemd\x2dfsck.slice. Mar 17 18:48:32.872998 systemd[1]: Created slice user.slice. Mar 17 18:48:32.873015 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:48:32.873030 systemd[1]: Started systemd-ask-password-wall.path. Mar 17 18:48:32.873048 systemd[1]: Set up automount boot.automount. Mar 17 18:48:32.873062 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Mar 17 18:48:32.873078 systemd[1]: Stopped target initrd-switch-root.target. Mar 17 18:48:32.873092 systemd[1]: Stopped target initrd-fs.target. Mar 17 18:48:32.873107 systemd[1]: Stopped target initrd-root-fs.target. Mar 17 18:48:32.873122 systemd[1]: Reached target integritysetup.target. Mar 17 18:48:32.873148 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:48:32.873168 systemd[1]: Reached target remote-fs.target. Mar 17 18:48:32.873182 systemd[1]: Reached target slices.target. Mar 17 18:48:32.873200 systemd[1]: Reached target swap.target. Mar 17 18:48:32.873215 systemd[1]: Reached target torcx.target. Mar 17 18:48:32.873229 systemd[1]: Reached target veritysetup.target. Mar 17 18:48:32.873245 systemd[1]: Listening on systemd-coredump.socket. Mar 17 18:48:32.873259 systemd[1]: Listening on systemd-initctl.socket. Mar 17 18:48:32.873274 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:48:32.873289 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:48:32.873305 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:48:32.873320 systemd[1]: Listening on systemd-userdbd.socket. Mar 17 18:48:32.873334 systemd[1]: Mounting dev-hugepages.mount... Mar 17 18:48:32.873355 systemd[1]: Mounting dev-mqueue.mount... Mar 17 18:48:32.873370 systemd[1]: Mounting media.mount... Mar 17 18:48:32.873385 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:32.873400 systemd[1]: Mounting sys-kernel-debug.mount... Mar 17 18:48:32.873415 systemd[1]: Mounting sys-kernel-tracing.mount... Mar 17 18:48:32.873429 systemd[1]: Mounting tmp.mount... Mar 17 18:48:32.873444 systemd[1]: Starting flatcar-tmpfiles.service... Mar 17 18:48:32.873460 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:48:32.873475 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:48:32.873507 systemd[1]: Starting modprobe@configfs.service... Mar 17 18:48:32.873531 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:48:32.873548 systemd[1]: Starting modprobe@drm.service... Mar 17 18:48:32.873562 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:48:32.873577 systemd[1]: Starting modprobe@fuse.service... Mar 17 18:48:32.873591 systemd[1]: Starting modprobe@loop.service... Mar 17 18:48:32.873606 kernel: fuse: init (API version 7.34) Mar 17 18:48:32.873621 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Mar 17 18:48:32.873636 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 17 18:48:32.873653 kernel: loop: module loaded Mar 17 18:48:32.873668 systemd[1]: Stopped systemd-fsck-root.service. Mar 17 18:48:32.873682 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Mar 17 18:48:32.873698 systemd[1]: Stopped systemd-fsck-usr.service. Mar 17 18:48:32.873712 systemd[1]: Stopped systemd-journald.service. Mar 17 18:48:32.873730 systemd[1]: Starting systemd-journald.service... Mar 17 18:48:32.873745 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:48:32.873759 systemd[1]: Starting systemd-network-generator.service... Mar 17 18:48:32.873780 systemd-journald[986]: Journal started Mar 17 18:48:32.873846 systemd-journald[986]: Runtime Journal (/run/log/journal/66368909b283aa4f0b9ae2eaa0fe7692) is 8.0M, max 148.8M, 140.8M free. Mar 17 18:48:28.153000 audit: BPF prog-id=9 op=UNLOAD Mar 17 18:48:28.461000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 18:48:28.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:48:28.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:48:28.609000 audit: BPF prog-id=10 op=LOAD Mar 17 18:48:28.609000 audit: BPF prog-id=10 op=UNLOAD Mar 17 18:48:28.609000 audit: BPF prog-id=11 op=LOAD Mar 17 18:48:28.609000 audit: BPF prog-id=11 op=UNLOAD Mar 17 18:48:28.773000 audit[894]: AVC avc: denied { associate } for pid=894 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 18:48:28.773000 audit[894]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178dc a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=877 pid=894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.773000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:48:28.783000 audit[894]: AVC avc: denied { associate } for pid=894 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Mar 17 18:48:28.783000 audit[894]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b5 a2=1ed a3=0 items=2 ppid=877 pid=894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.783000 audit: CWD cwd="/" Mar 17 18:48:28.783000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:28.783000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:28.783000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:48:31.958000 audit: BPF prog-id=12 op=LOAD Mar 17 18:48:31.958000 audit: BPF prog-id=3 op=UNLOAD Mar 17 18:48:31.963000 audit: BPF prog-id=13 op=LOAD Mar 17 18:48:31.970000 audit: BPF prog-id=14 op=LOAD Mar 17 18:48:31.970000 audit: BPF prog-id=4 op=UNLOAD Mar 17 18:48:31.970000 audit: BPF prog-id=5 op=UNLOAD Mar 17 18:48:31.977000 audit: BPF prog-id=15 op=LOAD Mar 17 18:48:31.977000 audit: BPF prog-id=12 op=UNLOAD Mar 17 18:48:31.984000 audit: BPF prog-id=16 op=LOAD Mar 17 18:48:31.991000 audit: BPF prog-id=17 op=LOAD Mar 17 18:48:31.991000 audit: BPF prog-id=13 op=UNLOAD Mar 17 18:48:31.991000 audit: BPF prog-id=14 op=UNLOAD Mar 17 18:48:31.998000 audit: BPF prog-id=18 op=LOAD Mar 17 18:48:31.998000 audit: BPF prog-id=15 op=UNLOAD Mar 17 18:48:32.005000 audit: BPF prog-id=19 op=LOAD Mar 17 18:48:32.033000 audit: BPF prog-id=20 op=LOAD Mar 17 18:48:32.034000 audit: BPF prog-id=16 op=UNLOAD Mar 17 18:48:32.034000 audit: BPF prog-id=17 op=UNLOAD Mar 17 18:48:32.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:32.047000 audit: BPF prog-id=18 op=UNLOAD Mar 17 18:48:32.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:32.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:32.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:32.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:32.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:32.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:32.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:32.825000 audit: BPF prog-id=21 op=LOAD Mar 17 18:48:32.825000 audit: BPF prog-id=22 op=LOAD Mar 17 18:48:32.825000 audit: BPF prog-id=23 op=LOAD Mar 17 18:48:32.826000 audit: BPF prog-id=19 op=UNLOAD Mar 17 18:48:32.826000 audit: BPF prog-id=20 op=UNLOAD Mar 17 18:48:32.860000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Mar 17 18:48:32.860000 audit[986]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe2112e490 a2=4000 a3=7ffe2112e52c items=0 ppid=1 pid=986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:32.860000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Mar 17 18:48:28.770198 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:48:31.957690 systemd[1]: Queued start job for default target multi-user.target. Mar 17 18:48:28.771478 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:48:31.957706 systemd[1]: Unnecessary job was removed for dev-sda6.device. Mar 17 18:48:28.771526 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:48:32.036124 systemd[1]: systemd-journald.service: Deactivated successfully. Mar 17 18:48:28.771573 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Mar 17 18:48:28.771586 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=debug msg="skipped missing lower profile" missing profile=oem Mar 17 18:48:28.771629 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Mar 17 18:48:28.771645 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Mar 17 18:48:28.771872 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Mar 17 18:48:28.771918 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:48:28.771934 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:48:28.773341 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Mar 17 18:48:28.773386 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Mar 17 18:48:28.773409 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Mar 17 18:48:28.773427 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Mar 17 18:48:28.773448 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Mar 17 18:48:28.773465 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Mar 17 18:48:31.317367 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:31Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:48:31.317683 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:31Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:48:31.317828 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:31Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:48:31.318066 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:31Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:48:31.318127 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:31Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Mar 17 18:48:31.318197 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2025-03-17T18:48:31Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Mar 17 18:48:32.885597 systemd[1]: Starting systemd-remount-fs.service... Mar 17 18:48:32.899543 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:48:32.913521 systemd[1]: verity-setup.service: Deactivated successfully. Mar 17 18:48:32.919522 systemd[1]: Stopped verity-setup.service. Mar 17 18:48:32.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:32.939539 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:32.949538 systemd[1]: Started systemd-journald.service. Mar 17 18:48:32.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:32.959024 systemd[1]: Mounted dev-hugepages.mount. Mar 17 18:48:32.966862 systemd[1]: Mounted dev-mqueue.mount. Mar 17 18:48:32.973849 systemd[1]: Mounted media.mount. Mar 17 18:48:32.980832 systemd[1]: Mounted sys-kernel-debug.mount. Mar 17 18:48:32.989922 systemd[1]: Mounted sys-kernel-tracing.mount. Mar 17 18:48:32.998789 systemd[1]: Mounted tmp.mount. Mar 17 18:48:33.005916 systemd[1]: Finished flatcar-tmpfiles.service. Mar 17 18:48:33.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.015057 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:48:33.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.024025 systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 17 18:48:33.024248 systemd[1]: Finished modprobe@configfs.service. Mar 17 18:48:33.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.033070 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:48:33.033294 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:48:33.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.042127 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:48:33.042344 systemd[1]: Finished modprobe@drm.service. Mar 17 18:48:33.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.051087 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:48:33.051309 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:48:33.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.060086 systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 17 18:48:33.060309 systemd[1]: Finished modprobe@fuse.service. Mar 17 18:48:33.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.069048 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:48:33.069289 systemd[1]: Finished modprobe@loop.service. Mar 17 18:48:33.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.078104 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:48:33.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.087064 systemd[1]: Finished systemd-network-generator.service. Mar 17 18:48:33.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.096061 systemd[1]: Finished systemd-remount-fs.service. Mar 17 18:48:33.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.105064 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:48:33.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.114372 systemd[1]: Reached target network-pre.target. Mar 17 18:48:33.124123 systemd[1]: Mounting sys-fs-fuse-connections.mount... Mar 17 18:48:33.135006 systemd[1]: Mounting sys-kernel-config.mount... Mar 17 18:48:33.143702 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Mar 17 18:48:33.147924 systemd[1]: Starting systemd-hwdb-update.service... Mar 17 18:48:33.157963 systemd[1]: Starting systemd-journal-flush.service... Mar 17 18:48:33.166706 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:48:33.168546 systemd[1]: Starting systemd-random-seed.service... Mar 17 18:48:33.170636 systemd-journald[986]: Time spent on flushing to /var/log/journal/66368909b283aa4f0b9ae2eaa0fe7692 is 78.163ms for 1145 entries. Mar 17 18:48:33.170636 systemd-journald[986]: System Journal (/var/log/journal/66368909b283aa4f0b9ae2eaa0fe7692) is 8.0M, max 584.8M, 576.8M free. Mar 17 18:48:33.280182 systemd-journald[986]: Received client request to flush runtime journal. Mar 17 18:48:33.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.183730 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:48:33.185663 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:48:33.194590 systemd[1]: Starting systemd-sysusers.service... Mar 17 18:48:33.203448 systemd[1]: Starting systemd-udev-settle.service... Mar 17 18:48:33.285166 udevadm[1000]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Mar 17 18:48:33.214015 systemd[1]: Mounted sys-fs-fuse-connections.mount. Mar 17 18:48:33.222938 systemd[1]: Mounted sys-kernel-config.mount. Mar 17 18:48:33.232097 systemd[1]: Finished systemd-random-seed.service. Mar 17 18:48:33.241165 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:48:33.253464 systemd[1]: Reached target first-boot-complete.target. Mar 17 18:48:33.282421 systemd[1]: Finished systemd-journal-flush.service. Mar 17 18:48:33.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.291321 systemd[1]: Finished systemd-sysusers.service. Mar 17 18:48:33.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.301741 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 18:48:33.366420 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 18:48:33.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.905454 systemd[1]: Finished systemd-hwdb-update.service. Mar 17 18:48:33.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:33.914000 audit: BPF prog-id=24 op=LOAD Mar 17 18:48:33.914000 audit: BPF prog-id=25 op=LOAD Mar 17 18:48:33.914000 audit: BPF prog-id=7 op=UNLOAD Mar 17 18:48:33.914000 audit: BPF prog-id=8 op=UNLOAD Mar 17 18:48:33.916620 systemd[1]: Starting systemd-udevd.service... Mar 17 18:48:33.940368 systemd-udevd[1005]: Using default interface naming scheme 'v252'. Mar 17 18:48:33.997623 systemd[1]: Started systemd-udevd.service. Mar 17 18:48:34.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:34.007000 audit: BPF prog-id=26 op=LOAD Mar 17 18:48:34.009732 systemd[1]: Starting systemd-networkd.service... Mar 17 18:48:34.024000 audit: BPF prog-id=27 op=LOAD Mar 17 18:48:34.024000 audit: BPF prog-id=28 op=LOAD Mar 17 18:48:34.024000 audit: BPF prog-id=29 op=LOAD Mar 17 18:48:34.027408 systemd[1]: Starting systemd-userdbd.service... Mar 17 18:48:34.092982 systemd[1]: Started systemd-userdbd.service. Mar 17 18:48:34.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:34.101988 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Mar 17 18:48:34.238592 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Mar 17 18:48:34.241954 systemd-networkd[1018]: lo: Link UP Mar 17 18:48:34.241968 systemd-networkd[1018]: lo: Gained carrier Mar 17 18:48:34.242769 systemd-networkd[1018]: Enumeration completed Mar 17 18:48:34.242926 systemd[1]: Started systemd-networkd.service. Mar 17 18:48:34.245572 systemd-networkd[1018]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:48:34.247932 systemd-networkd[1018]: eth0: Link UP Mar 17 18:48:34.248113 systemd-networkd[1018]: eth0: Gained carrier Mar 17 18:48:34.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:34.257724 systemd-networkd[1018]: eth0: DHCPv4 address 10.128.0.90/32, gateway 10.128.0.1 acquired from 169.254.169.254 Mar 17 18:48:34.255000 audit[1013]: AVC avc: denied { confidentiality } for pid=1013 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 18:48:34.255000 audit[1013]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b0facd69c0 a1=338ac a2=7f0a49c64bc5 a3=5 items=110 ppid=1005 pid=1013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:34.255000 audit: CWD cwd="/" Mar 17 18:48:34.255000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=1 name=(null) inode=14057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=2 name=(null) inode=14057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=3 name=(null) inode=14058 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=4 name=(null) inode=14057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=5 name=(null) inode=14059 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=6 name=(null) inode=14057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=7 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=8 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=9 name=(null) inode=14061 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=10 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=11 name=(null) inode=14062 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=12 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=13 name=(null) inode=14063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=14 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=15 name=(null) inode=14064 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=16 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=17 name=(null) inode=14065 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=18 name=(null) inode=14057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=19 name=(null) inode=14066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=20 name=(null) inode=14066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=21 name=(null) inode=14067 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=22 name=(null) inode=14066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=23 name=(null) inode=14068 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=24 name=(null) inode=14066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=25 name=(null) inode=14069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=26 name=(null) inode=14066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=27 name=(null) inode=14070 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=28 name=(null) inode=14066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=29 name=(null) inode=14071 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=30 name=(null) inode=14057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=31 name=(null) inode=14072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=32 name=(null) inode=14072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=33 name=(null) inode=14073 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=34 name=(null) inode=14072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=35 name=(null) inode=14074 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=36 name=(null) inode=14072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=37 name=(null) inode=14075 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=38 name=(null) inode=14072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=39 name=(null) inode=14076 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=40 name=(null) inode=14072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=41 name=(null) inode=14077 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=42 name=(null) inode=14057 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=43 name=(null) inode=14078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=44 name=(null) inode=14078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=45 name=(null) inode=14079 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=46 name=(null) inode=14078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=47 name=(null) inode=14080 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=48 name=(null) inode=14078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=49 name=(null) inode=14081 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=50 name=(null) inode=14078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=51 name=(null) inode=14082 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=52 name=(null) inode=14078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=53 name=(null) inode=14083 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=55 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=56 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=57 name=(null) inode=14085 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=58 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=59 name=(null) inode=14086 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=60 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=61 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=62 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=63 name=(null) inode=14088 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=64 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=65 name=(null) inode=14089 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=66 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=67 name=(null) inode=14090 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=68 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=69 name=(null) inode=14091 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=70 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=71 name=(null) inode=14092 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=72 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=73 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=74 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=75 name=(null) inode=14094 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=76 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=77 name=(null) inode=14095 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=78 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=79 name=(null) inode=14096 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=80 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=81 name=(null) inode=14097 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=82 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=83 name=(null) inode=14098 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=84 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=85 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=86 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=87 name=(null) inode=14100 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=88 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=89 name=(null) inode=14101 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=90 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=91 name=(null) inode=14102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=92 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=93 name=(null) inode=14103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=94 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=95 name=(null) inode=14104 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=96 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=97 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=98 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=99 name=(null) inode=14106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=100 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=101 name=(null) inode=14107 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=102 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=103 name=(null) inode=14108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=104 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=105 name=(null) inode=14109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=106 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=107 name=(null) inode=14110 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PATH item=109 name=(null) inode=14111 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:34.255000 audit: PROCTITLE proctitle="(udev-worker)" Mar 17 18:48:34.328524 kernel: EDAC MC: Ver: 3.0.0 Mar 17 18:48:34.349528 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Mar 17 18:48:34.405832 kernel: ACPI: button: Power Button [PWRF] Mar 17 18:48:34.405878 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Mar 17 18:48:34.405939 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Mar 17 18:48:34.405985 kernel: ACPI: button: Sleep Button [SLPF] Mar 17 18:48:34.416593 kernel: mousedev: PS/2 mouse device common for all mice Mar 17 18:48:34.425338 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:48:34.434091 systemd[1]: Finished systemd-udev-settle.service. Mar 17 18:48:34.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:34.444289 systemd[1]: Starting lvm2-activation-early.service... Mar 17 18:48:34.476792 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:48:34.506903 systemd[1]: Finished lvm2-activation-early.service. Mar 17 18:48:34.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:34.515904 systemd[1]: Reached target cryptsetup.target. Mar 17 18:48:34.526216 systemd[1]: Starting lvm2-activation.service... Mar 17 18:48:34.532758 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:48:34.560008 systemd[1]: Finished lvm2-activation.service. Mar 17 18:48:34.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:34.569030 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:48:34.577685 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 17 18:48:34.577740 systemd[1]: Reached target local-fs.target. Mar 17 18:48:34.586684 systemd[1]: Reached target machines.target. Mar 17 18:48:34.597299 systemd[1]: Starting ldconfig.service... Mar 17 18:48:34.607151 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:48:34.607249 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:34.609082 systemd[1]: Starting systemd-boot-update.service... Mar 17 18:48:34.618360 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Mar 17 18:48:34.630829 systemd[1]: Starting systemd-machine-id-commit.service... Mar 17 18:48:34.633097 systemd[1]: Starting systemd-sysext.service... Mar 17 18:48:34.634897 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1045 (bootctl) Mar 17 18:48:34.637258 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Mar 17 18:48:34.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:34.656186 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Mar 17 18:48:34.666587 systemd[1]: Unmounting usr-share-oem.mount... Mar 17 18:48:34.675092 systemd[1]: usr-share-oem.mount: Deactivated successfully. Mar 17 18:48:34.675363 systemd[1]: Unmounted usr-share-oem.mount. Mar 17 18:48:34.700536 kernel: loop0: detected capacity change from 0 to 218376 Mar 17 18:48:34.804013 systemd-fsck[1055]: fsck.fat 4.2 (2021-01-31) Mar 17 18:48:34.804013 systemd-fsck[1055]: /dev/sda1: 789 files, 119299/258078 clusters Mar 17 18:48:34.808104 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Mar 17 18:48:34.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:34.819653 systemd[1]: Mounting boot.mount... Mar 17 18:48:34.834685 systemd[1]: Mounted boot.mount. Mar 17 18:48:34.865523 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 17 18:48:34.880609 systemd[1]: Finished systemd-boot-update.service. Mar 17 18:48:34.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:34.920540 kernel: loop1: detected capacity change from 0 to 218376 Mar 17 18:48:34.948725 (sd-sysext)[1059]: Using extensions 'kubernetes'. Mar 17 18:48:34.949808 (sd-sysext)[1059]: Merged extensions into '/usr'. Mar 17 18:48:34.977722 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:34.980454 systemd[1]: Mounting usr-share-oem.mount... Mar 17 18:48:34.988003 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:48:34.990549 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:48:35.000614 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:48:35.009616 systemd[1]: Starting modprobe@loop.service... Mar 17 18:48:35.017857 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:48:35.018122 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:35.018338 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:35.022476 systemd[1]: Mounted usr-share-oem.mount. Mar 17 18:48:35.030297 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:48:35.030519 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:48:35.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.039383 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:48:35.039619 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:48:35.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.048343 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:48:35.048566 systemd[1]: Finished modprobe@loop.service. Mar 17 18:48:35.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.058605 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:48:35.058821 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:48:35.061318 systemd[1]: Finished systemd-sysext.service. Mar 17 18:48:35.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.071562 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Mar 17 18:48:35.072266 systemd[1]: Finished systemd-machine-id-commit.service. Mar 17 18:48:35.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.082399 systemd[1]: Starting ensure-sysext.service... Mar 17 18:48:35.091072 systemd[1]: Starting systemd-tmpfiles-setup.service... Mar 17 18:48:35.103940 systemd[1]: Reloading. Mar 17 18:48:35.116434 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Mar 17 18:48:35.119732 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Mar 17 18:48:35.125925 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Mar 17 18:48:35.245298 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2025-03-17T18:48:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:48:35.249549 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2025-03-17T18:48:35Z" level=info msg="torcx already run" Mar 17 18:48:35.321647 ldconfig[1044]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Mar 17 18:48:35.439286 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:48:35.439313 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:48:35.463554 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:48:35.540000 audit: BPF prog-id=30 op=LOAD Mar 17 18:48:35.540000 audit: BPF prog-id=26 op=UNLOAD Mar 17 18:48:35.542000 audit: BPF prog-id=31 op=LOAD Mar 17 18:48:35.542000 audit: BPF prog-id=27 op=UNLOAD Mar 17 18:48:35.542000 audit: BPF prog-id=32 op=LOAD Mar 17 18:48:35.542000 audit: BPF prog-id=33 op=LOAD Mar 17 18:48:35.542000 audit: BPF prog-id=28 op=UNLOAD Mar 17 18:48:35.542000 audit: BPF prog-id=29 op=UNLOAD Mar 17 18:48:35.545000 audit: BPF prog-id=34 op=LOAD Mar 17 18:48:35.545000 audit: BPF prog-id=21 op=UNLOAD Mar 17 18:48:35.545000 audit: BPF prog-id=35 op=LOAD Mar 17 18:48:35.545000 audit: BPF prog-id=36 op=LOAD Mar 17 18:48:35.545000 audit: BPF prog-id=22 op=UNLOAD Mar 17 18:48:35.545000 audit: BPF prog-id=23 op=UNLOAD Mar 17 18:48:35.546000 audit: BPF prog-id=37 op=LOAD Mar 17 18:48:35.546000 audit: BPF prog-id=38 op=LOAD Mar 17 18:48:35.546000 audit: BPF prog-id=24 op=UNLOAD Mar 17 18:48:35.546000 audit: BPF prog-id=25 op=UNLOAD Mar 17 18:48:35.551650 systemd[1]: Finished ldconfig.service. Mar 17 18:48:35.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.560437 systemd[1]: Finished systemd-tmpfiles-setup.service. Mar 17 18:48:35.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.575230 systemd[1]: Starting audit-rules.service... Mar 17 18:48:35.585943 systemd[1]: Starting clean-ca-certificates.service... Mar 17 18:48:35.597134 systemd[1]: Starting oem-gce-enable-oslogin.service... Mar 17 18:48:35.608094 systemd[1]: Starting systemd-journal-catalog-update.service... Mar 17 18:48:35.616000 audit: BPF prog-id=39 op=LOAD Mar 17 18:48:35.620562 systemd[1]: Starting systemd-resolved.service... Mar 17 18:48:35.627000 audit: BPF prog-id=40 op=LOAD Mar 17 18:48:35.631004 systemd[1]: Starting systemd-timesyncd.service... Mar 17 18:48:35.639768 systemd[1]: Starting systemd-update-utmp.service... Mar 17 18:48:35.648656 systemd[1]: Finished clean-ca-certificates.service. Mar 17 18:48:35.649000 audit[1157]: SYSTEM_BOOT pid=1157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.658604 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Mar 17 18:48:35.658890 systemd[1]: Finished oem-gce-enable-oslogin.service. Mar 17 18:48:35.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:35.671093 systemd[1]: Finished systemd-journal-catalog-update.service. Mar 17 18:48:35.673000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 18:48:35.673000 audit[1161]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdd7703ff0 a2=420 a3=0 items=0 ppid=1131 pid=1161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:35.675459 augenrules[1161]: No rules Mar 17 18:48:35.673000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 18:48:35.684786 systemd[1]: Finished audit-rules.service. Mar 17 18:48:35.694982 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:35.695544 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:48:35.699200 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:48:35.708951 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:48:35.718629 systemd[1]: Starting modprobe@loop.service... Mar 17 18:48:35.727977 systemd[1]: Starting oem-gce-enable-oslogin.service... Mar 17 18:48:35.736750 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:48:35.737119 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:35.738233 enable-oslogin[1169]: /etc/pam.d/sshd already exists. Not enabling OS Login Mar 17 18:48:35.739915 systemd[1]: Starting systemd-update-done.service... Mar 17 18:48:35.747814 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:48:35.748150 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:35.751981 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:48:35.752238 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:48:35.762392 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:48:35.762626 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:48:35.771993 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:48:35.772202 systemd[1]: Finished modprobe@loop.service. Mar 17 18:48:35.781535 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Mar 17 18:48:35.781792 systemd[1]: Finished oem-gce-enable-oslogin.service. Mar 17 18:48:35.791401 systemd[1]: Finished systemd-update-done.service. Mar 17 18:48:35.806569 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:35.807626 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:48:35.812388 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:48:35.818198 systemd-resolved[1149]: Positive Trust Anchors: Mar 17 18:48:35.818664 systemd-resolved[1149]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:48:35.818845 systemd-resolved[1149]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:48:35.821860 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:48:35.830961 systemd[1]: Starting modprobe@loop.service... Mar 17 18:48:35.839911 systemd[1]: Starting oem-gce-enable-oslogin.service... Mar 17 18:48:35.841177 systemd-resolved[1149]: Defaulting to hostname 'linux'. Mar 17 18:48:35.845421 enable-oslogin[1174]: /etc/pam.d/sshd already exists. Not enabling OS Login Mar 17 18:48:35.848728 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:48:35.849000 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:35.849203 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:48:35.849350 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:35.851479 systemd[1]: Started systemd-resolved.service. Mar 17 18:48:35.860658 systemd[1]: Finished systemd-update-utmp.service. Mar 17 18:48:35.870531 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:48:35.870748 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:48:35.880240 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:48:35.880399 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:48:35.889241 systemd[1]: Started systemd-timesyncd.service. Mar 17 18:48:35.890059 systemd-timesyncd[1153]: Contacted time server 169.254.169.254:123 (169.254.169.254). Mar 17 18:48:35.890438 systemd-timesyncd[1153]: Initial clock synchronization to Mon 2025-03-17 18:48:35.908434 UTC. Mar 17 18:48:35.898792 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:48:35.898967 systemd[1]: Finished modprobe@loop.service. Mar 17 18:48:35.908319 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Mar 17 18:48:35.908600 systemd[1]: Finished oem-gce-enable-oslogin.service. Mar 17 18:48:35.918468 systemd[1]: Reached target network.target. Mar 17 18:48:35.926831 systemd[1]: Reached target nss-lookup.target. Mar 17 18:48:35.935869 systemd[1]: Reached target time-set.target. Mar 17 18:48:35.944880 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:48:35.945119 systemd[1]: Reached target sysinit.target. Mar 17 18:48:35.954138 systemd[1]: Started motdgen.path. Mar 17 18:48:35.962034 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Mar 17 18:48:35.972219 systemd[1]: Started logrotate.timer. Mar 17 18:48:35.980158 systemd[1]: Started mdadm.timer. Mar 17 18:48:35.987939 systemd[1]: Started systemd-tmpfiles-clean.timer. Mar 17 18:48:35.996901 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Mar 17 18:48:35.997137 systemd[1]: Reached target paths.target. Mar 17 18:48:36.004884 systemd[1]: Reached target timers.target. Mar 17 18:48:36.012850 systemd[1]: Listening on dbus.socket. Mar 17 18:48:36.021780 systemd[1]: Starting docker.socket... Mar 17 18:48:36.033107 systemd[1]: Listening on sshd.socket. Mar 17 18:48:36.040975 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:36.041261 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:48:36.044240 systemd[1]: Listening on docker.socket. Mar 17 18:48:36.054696 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Mar 17 18:48:36.054903 systemd[1]: Reached target sockets.target. Mar 17 18:48:36.063824 systemd[1]: Reached target basic.target. Mar 17 18:48:36.070870 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:48:36.071107 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:48:36.073381 systemd[1]: Starting containerd.service... Mar 17 18:48:36.082865 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Mar 17 18:48:36.095039 systemd[1]: Starting dbus.service... Mar 17 18:48:36.103995 systemd[1]: Starting enable-oem-cloudinit.service... Mar 17 18:48:36.104675 systemd-networkd[1018]: eth0: Gained IPv6LL Mar 17 18:48:36.112810 systemd[1]: Starting extend-filesystems.service... Mar 17 18:48:36.120766 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Mar 17 18:48:36.123206 systemd[1]: Starting modprobe@drm.service... Mar 17 18:48:36.126269 jq[1181]: false Mar 17 18:48:36.133371 systemd[1]: Starting motdgen.service... Mar 17 18:48:36.140711 systemd[1]: Starting ssh-key-proc-cmdline.service... Mar 17 18:48:36.150464 systemd[1]: Starting sshd-keygen.service... Mar 17 18:48:36.160340 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 18:48:36.168955 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:36.169260 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Mar 17 18:48:36.170176 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Mar 17 18:48:36.171758 systemd[1]: Starting update-engine.service... Mar 17 18:48:36.180783 systemd[1]: Starting update-ssh-keys-after-ignition.service... Mar 17 18:48:36.195682 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Mar 17 18:48:36.197024 jq[1201]: true Mar 17 18:48:36.199239 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Mar 17 18:48:36.200942 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:48:36.201184 systemd[1]: Finished modprobe@drm.service. Mar 17 18:48:36.210520 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Mar 17 18:48:36.210764 systemd[1]: Finished ssh-key-proc-cmdline.service. Mar 17 18:48:36.220576 systemd[1]: motdgen.service: Deactivated successfully. Mar 17 18:48:36.220813 systemd[1]: Finished motdgen.service. Mar 17 18:48:36.223696 extend-filesystems[1182]: Found loop1 Mar 17 18:48:36.236776 extend-filesystems[1182]: Found sda Mar 17 18:48:36.236776 extend-filesystems[1182]: Found sda1 Mar 17 18:48:36.236776 extend-filesystems[1182]: Found sda2 Mar 17 18:48:36.236776 extend-filesystems[1182]: Found sda3 Mar 17 18:48:36.236776 extend-filesystems[1182]: Found usr Mar 17 18:48:36.236776 extend-filesystems[1182]: Found sda4 Mar 17 18:48:36.236776 extend-filesystems[1182]: Found sda6 Mar 17 18:48:36.236776 extend-filesystems[1182]: Found sda7 Mar 17 18:48:36.236776 extend-filesystems[1182]: Found sda9 Mar 17 18:48:36.236776 extend-filesystems[1182]: Checking size of /dev/sda9 Mar 17 18:48:36.373412 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Mar 17 18:48:36.373537 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Mar 17 18:48:36.229889 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 18:48:36.373742 extend-filesystems[1182]: Resized partition /dev/sda9 Mar 17 18:48:36.243219 dbus-daemon[1180]: [system] SELinux support is enabled Mar 17 18:48:36.390141 update_engine[1200]: I0317 18:48:36.331835 1200 main.cc:92] Flatcar Update Engine starting Mar 17 18:48:36.390141 update_engine[1200]: I0317 18:48:36.344157 1200 update_check_scheduler.cc:74] Next update check in 11m58s Mar 17 18:48:36.245592 systemd[1]: Started dbus.service. Mar 17 18:48:36.390594 extend-filesystems[1212]: resize2fs 1.46.5 (30-Dec-2021) Mar 17 18:48:36.390594 extend-filesystems[1212]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Mar 17 18:48:36.390594 extend-filesystems[1212]: old_desc_blocks = 1, new_desc_blocks = 2 Mar 17 18:48:36.390594 extend-filesystems[1212]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Mar 17 18:48:36.246787 dbus-daemon[1180]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1018 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Mar 17 18:48:36.456835 jq[1210]: true Mar 17 18:48:36.272872 systemd[1]: Finished ensure-sysext.service. Mar 17 18:48:36.457251 extend-filesystems[1182]: Resized filesystem in /dev/sda9 Mar 17 18:48:36.272462 dbus-daemon[1180]: [system] Successfully activated service 'org.freedesktop.systemd1' Mar 17 18:48:36.474829 env[1211]: time="2025-03-17T18:48:36.451023924Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Mar 17 18:48:36.288675 systemd[1]: Reached target network-online.target. Mar 17 18:48:36.313182 systemd[1]: Starting kubelet.service... Mar 17 18:48:36.475761 bash[1236]: Updated "/home/core/.ssh/authorized_keys" Mar 17 18:48:36.326731 systemd[1]: Starting oem-gce.service... Mar 17 18:48:36.331881 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Mar 17 18:48:36.331949 systemd[1]: Reached target system-config.target. Mar 17 18:48:36.365321 systemd[1]: Starting systemd-hostnamed.service... Mar 17 18:48:36.385945 systemd[1]: Starting systemd-logind.service... Mar 17 18:48:36.396857 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Mar 17 18:48:36.396939 systemd[1]: Reached target user-config.target. Mar 17 18:48:36.406660 systemd[1]: extend-filesystems.service: Deactivated successfully. Mar 17 18:48:36.406949 systemd[1]: Finished extend-filesystems.service. Mar 17 18:48:36.424397 systemd[1]: Finished update-ssh-keys-after-ignition.service. Mar 17 18:48:36.444873 systemd[1]: Started update-engine.service. Mar 17 18:48:36.482741 systemd[1]: Started locksmithd.service. Mar 17 18:48:36.487295 mkfs.ext4[1243]: mke2fs 1.46.5 (30-Dec-2021) Mar 17 18:48:36.493566 mkfs.ext4[1243]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Mar 17 18:48:36.493686 mkfs.ext4[1243]: Creating filesystem with 262144 4k blocks and 65536 inodes Mar 17 18:48:36.493686 mkfs.ext4[1243]: Filesystem UUID: 27754894-1b09-4ce1-94d0-abaeb9056487 Mar 17 18:48:36.493686 mkfs.ext4[1243]: Superblock backups stored on blocks: Mar 17 18:48:36.493686 mkfs.ext4[1243]: 32768, 98304, 163840, 229376 Mar 17 18:48:36.493686 mkfs.ext4[1243]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Mar 17 18:48:36.493912 mkfs.ext4[1243]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Mar 17 18:48:36.495956 mkfs.ext4[1243]: Creating journal (8192 blocks): done Mar 17 18:48:36.499195 mkfs.ext4[1243]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Mar 17 18:48:36.544088 umount[1248]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Mar 17 18:48:36.557541 systemd-logind[1237]: Watching system buttons on /dev/input/event1 (Power Button) Mar 17 18:48:36.557584 systemd-logind[1237]: Watching system buttons on /dev/input/event3 (Sleep Button) Mar 17 18:48:36.557615 systemd-logind[1237]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Mar 17 18:48:36.559950 systemd-logind[1237]: New seat seat0. Mar 17 18:48:36.568142 systemd[1]: Started systemd-logind.service. Mar 17 18:48:36.603529 kernel: loop2: detected capacity change from 0 to 2097152 Mar 17 18:48:36.642664 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 18:48:36.687911 env[1211]: time="2025-03-17T18:48:36.685819993Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 17 18:48:36.688279 env[1211]: time="2025-03-17T18:48:36.688240037Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:36.702975 coreos-metadata[1179]: Mar 17 18:48:36.702 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Mar 17 18:48:36.704153 env[1211]: time="2025-03-17T18:48:36.704077484Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.179-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:48:36.704335 env[1211]: time="2025-03-17T18:48:36.704307660Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:36.705742 env[1211]: time="2025-03-17T18:48:36.705683921Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:48:36.706420 env[1211]: time="2025-03-17T18:48:36.706382958Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:36.706633 env[1211]: time="2025-03-17T18:48:36.706604555Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 17 18:48:36.706782 env[1211]: time="2025-03-17T18:48:36.706756808Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:36.707258 env[1211]: time="2025-03-17T18:48:36.707066674Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:36.717780 env[1211]: time="2025-03-17T18:48:36.710800524Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:36.717780 env[1211]: time="2025-03-17T18:48:36.711138918Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:48:36.717780 env[1211]: time="2025-03-17T18:48:36.711189880Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 17 18:48:36.717780 env[1211]: time="2025-03-17T18:48:36.711304490Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 17 18:48:36.717780 env[1211]: time="2025-03-17T18:48:36.711324341Z" level=info msg="metadata content store policy set" policy=shared Mar 17 18:48:36.721336 coreos-metadata[1179]: Mar 17 18:48:36.721 INFO Fetch failed with 404: resource not found Mar 17 18:48:36.721668 coreos-metadata[1179]: Mar 17 18:48:36.721 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Mar 17 18:48:36.722487 dbus-daemon[1180]: [system] Successfully activated service 'org.freedesktop.hostname1' Mar 17 18:48:36.723067 systemd[1]: Started systemd-hostnamed.service. Mar 17 18:48:36.723941 dbus-daemon[1180]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1234 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Mar 17 18:48:36.726941 coreos-metadata[1179]: Mar 17 18:48:36.726 INFO Fetch successful Mar 17 18:48:36.727162 coreos-metadata[1179]: Mar 17 18:48:36.727 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Mar 17 18:48:36.727920 coreos-metadata[1179]: Mar 17 18:48:36.727 INFO Fetch failed with 404: resource not found Mar 17 18:48:36.727920 coreos-metadata[1179]: Mar 17 18:48:36.727 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Mar 17 18:48:36.729884 coreos-metadata[1179]: Mar 17 18:48:36.728 INFO Fetch failed with 404: resource not found Mar 17 18:48:36.729884 coreos-metadata[1179]: Mar 17 18:48:36.728 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Mar 17 18:48:36.736604 coreos-metadata[1179]: Mar 17 18:48:36.732 INFO Fetch successful Mar 17 18:48:36.736397 systemd[1]: Starting polkit.service... Mar 17 18:48:36.739573 env[1211]: time="2025-03-17T18:48:36.739330620Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 17 18:48:36.739573 env[1211]: time="2025-03-17T18:48:36.739390943Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 17 18:48:36.739573 env[1211]: time="2025-03-17T18:48:36.739416207Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 17 18:48:36.739573 env[1211]: time="2025-03-17T18:48:36.739478004Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 17 18:48:36.741556 env[1211]: time="2025-03-17T18:48:36.740381166Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 17 18:48:36.741556 env[1211]: time="2025-03-17T18:48:36.740434111Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 17 18:48:36.741556 env[1211]: time="2025-03-17T18:48:36.740457295Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 17 18:48:36.741556 env[1211]: time="2025-03-17T18:48:36.740480551Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 17 18:48:36.741556 env[1211]: time="2025-03-17T18:48:36.740534573Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 17 18:48:36.741556 env[1211]: time="2025-03-17T18:48:36.740561312Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 17 18:48:36.741556 env[1211]: time="2025-03-17T18:48:36.740583239Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 17 18:48:36.741556 env[1211]: time="2025-03-17T18:48:36.740605118Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 17 18:48:36.741556 env[1211]: time="2025-03-17T18:48:36.740894241Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 17 18:48:36.741556 env[1211]: time="2025-03-17T18:48:36.741009876Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 17 18:48:36.741556 env[1211]: time="2025-03-17T18:48:36.741458550Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 17 18:48:36.746902 env[1211]: time="2025-03-17T18:48:36.746573576Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.746902 env[1211]: time="2025-03-17T18:48:36.746616035Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 17 18:48:36.748183 unknown[1179]: wrote ssh authorized keys file for user: core Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749017568Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749055048Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749077888Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749099040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749120347Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749144743Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749165812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749187820Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749212189Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749391204Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749415102Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.751275 env[1211]: time="2025-03-17T18:48:36.749437019Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.754523 env[1211]: time="2025-03-17T18:48:36.753884829Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 17 18:48:36.754523 env[1211]: time="2025-03-17T18:48:36.753934185Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 17 18:48:36.754523 env[1211]: time="2025-03-17T18:48:36.753958269Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 17 18:48:36.754523 env[1211]: time="2025-03-17T18:48:36.754009983Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 17 18:48:36.754523 env[1211]: time="2025-03-17T18:48:36.754063899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 17 18:48:36.754821 env[1211]: time="2025-03-17T18:48:36.754381660Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 17 18:48:36.754821 env[1211]: time="2025-03-17T18:48:36.754475316Z" level=info msg="Connect containerd service" Mar 17 18:48:36.760327 env[1211]: time="2025-03-17T18:48:36.754990222Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 17 18:48:36.760327 env[1211]: time="2025-03-17T18:48:36.759277205Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:48:36.776206 env[1211]: time="2025-03-17T18:48:36.776121058Z" level=info msg="Start subscribing containerd event" Mar 17 18:48:36.776367 env[1211]: time="2025-03-17T18:48:36.776246138Z" level=info msg="Start recovering state" Mar 17 18:48:36.776459 env[1211]: time="2025-03-17T18:48:36.776362303Z" level=info msg="Start event monitor" Mar 17 18:48:36.776459 env[1211]: time="2025-03-17T18:48:36.776382325Z" level=info msg="Start snapshots syncer" Mar 17 18:48:36.776459 env[1211]: time="2025-03-17T18:48:36.776419632Z" level=info msg="Start cni network conf syncer for default" Mar 17 18:48:36.776459 env[1211]: time="2025-03-17T18:48:36.776435014Z" level=info msg="Start streaming server" Mar 17 18:48:36.778590 env[1211]: time="2025-03-17T18:48:36.778550814Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 17 18:48:36.779643 env[1211]: time="2025-03-17T18:48:36.779612485Z" level=info msg=serving... address=/run/containerd/containerd.sock Mar 17 18:48:36.779950 systemd[1]: Started containerd.service. Mar 17 18:48:36.781158 env[1211]: time="2025-03-17T18:48:36.780215750Z" level=info msg="containerd successfully booted in 0.344478s" Mar 17 18:48:36.794385 update-ssh-keys[1256]: Updated "/home/core/.ssh/authorized_keys" Mar 17 18:48:36.795306 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Mar 17 18:48:36.859848 polkitd[1255]: Started polkitd version 121 Mar 17 18:48:36.894691 polkitd[1255]: Loading rules from directory /etc/polkit-1/rules.d Mar 17 18:48:36.895578 polkitd[1255]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 17 18:48:36.906401 polkitd[1255]: Finished loading, compiling and executing 2 rules Mar 17 18:48:36.909477 dbus-daemon[1180]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Mar 17 18:48:36.910143 systemd[1]: Started polkit.service. Mar 17 18:48:36.911078 polkitd[1255]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Mar 17 18:48:36.962857 systemd-hostnamed[1234]: Hostname set to (transient) Mar 17 18:48:36.967944 systemd-resolved[1149]: System hostname changed to 'ci-3510-3-7-508dc970ccf9e7957c10.c.flatcar-212911.internal'. Mar 17 18:48:38.483338 systemd[1]: Started kubelet.service. Mar 17 18:48:38.575432 locksmithd[1245]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Mar 17 18:48:39.852031 kubelet[1271]: E0317 18:48:39.851978 1271 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:48:39.857908 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:48:39.858109 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:48:39.858488 systemd[1]: kubelet.service: Consumed 1.487s CPU time. Mar 17 18:48:40.408122 sshd_keygen[1204]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Mar 17 18:48:40.450738 systemd[1]: Finished sshd-keygen.service. Mar 17 18:48:40.460246 systemd[1]: Starting issuegen.service... Mar 17 18:48:40.472971 systemd[1]: issuegen.service: Deactivated successfully. Mar 17 18:48:40.473243 systemd[1]: Finished issuegen.service. Mar 17 18:48:40.483717 systemd[1]: Starting systemd-user-sessions.service... Mar 17 18:48:40.496692 systemd[1]: Finished systemd-user-sessions.service. Mar 17 18:48:40.508313 systemd[1]: Started getty@tty1.service. Mar 17 18:48:40.518241 systemd[1]: Started serial-getty@ttyS0.service. Mar 17 18:48:40.527068 systemd[1]: Reached target getty.target. Mar 17 18:48:42.410657 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Mar 17 18:48:44.482544 kernel: loop2: detected capacity change from 0 to 2097152 Mar 17 18:48:44.504578 systemd-nspawn[1291]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Mar 17 18:48:44.504578 systemd-nspawn[1291]: Press ^] three times within 1s to kill container. Mar 17 18:48:44.517536 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 18:48:44.603835 systemd[1]: Started oem-gce.service. Mar 17 18:48:44.611169 systemd[1]: Reached target multi-user.target. Mar 17 18:48:44.621726 systemd[1]: Starting systemd-update-utmp-runlevel.service... Mar 17 18:48:44.636216 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 17 18:48:44.636465 systemd[1]: Finished systemd-update-utmp-runlevel.service. Mar 17 18:48:44.646874 systemd[1]: Startup finished in 1.050s (kernel) + 7.512s (initrd) + 16.312s (userspace) = 24.876s. Mar 17 18:48:44.675843 systemd-nspawn[1291]: + '[' -e /etc/default/instance_configs.cfg.template ']' Mar 17 18:48:44.675843 systemd-nspawn[1291]: + echo -e '[InstanceSetup]\nset_host_keys = false' Mar 17 18:48:44.676123 systemd-nspawn[1291]: + /usr/bin/google_instance_setup Mar 17 18:48:45.329190 instance-setup[1297]: INFO Running google_set_multiqueue. Mar 17 18:48:45.347936 instance-setup[1297]: INFO Set channels for eth0 to 2. Mar 17 18:48:45.351867 instance-setup[1297]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Mar 17 18:48:45.353295 instance-setup[1297]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Mar 17 18:48:45.353728 instance-setup[1297]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Mar 17 18:48:45.355249 instance-setup[1297]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Mar 17 18:48:45.355615 instance-setup[1297]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Mar 17 18:48:45.356997 instance-setup[1297]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Mar 17 18:48:45.357424 instance-setup[1297]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Mar 17 18:48:45.358869 instance-setup[1297]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Mar 17 18:48:45.370930 instance-setup[1297]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Mar 17 18:48:45.371334 instance-setup[1297]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Mar 17 18:48:45.416008 systemd-nspawn[1291]: + /usr/bin/google_metadata_script_runner --script-type startup Mar 17 18:48:45.757520 startup-script[1328]: INFO Starting startup scripts. Mar 17 18:48:45.771374 startup-script[1328]: INFO No startup scripts found in metadata. Mar 17 18:48:45.771574 startup-script[1328]: INFO Finished running startup scripts. Mar 17 18:48:45.808732 systemd-nspawn[1291]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Mar 17 18:48:45.808732 systemd-nspawn[1291]: + daemon_pids=() Mar 17 18:48:45.808732 systemd-nspawn[1291]: + for d in accounts clock_skew network Mar 17 18:48:45.809469 systemd-nspawn[1291]: + daemon_pids+=($!) Mar 17 18:48:45.809469 systemd-nspawn[1291]: + for d in accounts clock_skew network Mar 17 18:48:45.809606 systemd-nspawn[1291]: + daemon_pids+=($!) Mar 17 18:48:45.809606 systemd-nspawn[1291]: + for d in accounts clock_skew network Mar 17 18:48:45.809952 systemd-nspawn[1291]: + daemon_pids+=($!) Mar 17 18:48:45.810111 systemd-nspawn[1291]: + NOTIFY_SOCKET=/run/systemd/notify Mar 17 18:48:45.810244 systemd-nspawn[1291]: + /usr/bin/google_accounts_daemon Mar 17 18:48:45.810316 systemd-nspawn[1291]: + /usr/bin/systemd-notify --ready Mar 17 18:48:45.810860 systemd-nspawn[1291]: + /usr/bin/google_clock_skew_daemon Mar 17 18:48:45.810973 systemd-nspawn[1291]: + /usr/bin/google_network_daemon Mar 17 18:48:45.881140 systemd-nspawn[1291]: + wait -n 36 37 38 Mar 17 18:48:46.088719 systemd[1]: Created slice system-sshd.slice. Mar 17 18:48:46.092141 systemd[1]: Started sshd@0-10.128.0.90:22-139.178.89.65:54782.service. Mar 17 18:48:46.435801 sshd[1336]: Accepted publickey for core from 139.178.89.65 port 54782 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:48:46.439461 sshd[1336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:48:46.458667 systemd[1]: Created slice user-500.slice. Mar 17 18:48:46.460765 systemd[1]: Starting user-runtime-dir@500.service... Mar 17 18:48:46.469352 systemd-logind[1237]: New session 1 of user core. Mar 17 18:48:46.481431 systemd[1]: Finished user-runtime-dir@500.service. Mar 17 18:48:46.485114 systemd[1]: Starting user@500.service... Mar 17 18:48:46.505822 (systemd)[1345]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:48:46.585047 google-clock-skew[1332]: INFO Starting Google Clock Skew daemon. Mar 17 18:48:46.618167 google-clock-skew[1332]: INFO Clock drift token has changed: 0. Mar 17 18:48:46.630042 systemd-nspawn[1291]: hwclock: Cannot access the Hardware Clock via any known method. Mar 17 18:48:46.631324 google-clock-skew[1332]: WARNING Failed to sync system time with hardware clock. Mar 17 18:48:46.632589 systemd-nspawn[1291]: hwclock: Use the --verbose option to see the details of our search for an access method. Mar 17 18:48:46.698575 systemd[1345]: Queued start job for default target default.target. Mar 17 18:48:46.700408 systemd[1345]: Reached target paths.target. Mar 17 18:48:46.700458 systemd[1345]: Reached target sockets.target. Mar 17 18:48:46.700480 systemd[1345]: Reached target timers.target. Mar 17 18:48:46.700528 systemd[1345]: Reached target basic.target. Mar 17 18:48:46.700694 systemd[1]: Started user@500.service. Mar 17 18:48:46.702344 google-networking[1333]: INFO Starting Google Networking daemon. Mar 17 18:48:46.703200 systemd[1]: Started session-1.scope. Mar 17 18:48:46.706224 systemd[1345]: Reached target default.target. Mar 17 18:48:46.706571 systemd[1345]: Startup finished in 188ms. Mar 17 18:48:46.762424 groupadd[1354]: group added to /etc/group: name=google-sudoers, GID=1000 Mar 17 18:48:46.766633 groupadd[1354]: group added to /etc/gshadow: name=google-sudoers Mar 17 18:48:46.771042 groupadd[1354]: new group: name=google-sudoers, GID=1000 Mar 17 18:48:46.785453 google-accounts[1331]: INFO Starting Google Accounts daemon. Mar 17 18:48:46.811606 google-accounts[1331]: WARNING OS Login not installed. Mar 17 18:48:46.812867 google-accounts[1331]: INFO Creating a new user account for 0. Mar 17 18:48:46.818814 systemd-nspawn[1291]: useradd: invalid user name '0': use --badname to ignore Mar 17 18:48:46.819651 google-accounts[1331]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Mar 17 18:48:46.926484 systemd[1]: Started sshd@1-10.128.0.90:22-139.178.89.65:54788.service. Mar 17 18:48:47.214013 sshd[1366]: Accepted publickey for core from 139.178.89.65 port 54788 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:48:47.216025 sshd[1366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:48:47.222593 systemd-logind[1237]: New session 2 of user core. Mar 17 18:48:47.223320 systemd[1]: Started session-2.scope. Mar 17 18:48:47.428128 sshd[1366]: pam_unix(sshd:session): session closed for user core Mar 17 18:48:47.433762 systemd[1]: sshd@1-10.128.0.90:22-139.178.89.65:54788.service: Deactivated successfully. Mar 17 18:48:47.434953 systemd[1]: session-2.scope: Deactivated successfully. Mar 17 18:48:47.435957 systemd-logind[1237]: Session 2 logged out. Waiting for processes to exit. Mar 17 18:48:47.437236 systemd-logind[1237]: Removed session 2. Mar 17 18:48:47.474841 systemd[1]: Started sshd@2-10.128.0.90:22-139.178.89.65:54796.service. Mar 17 18:48:47.761593 sshd[1373]: Accepted publickey for core from 139.178.89.65 port 54796 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:48:47.763778 sshd[1373]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:48:47.769574 systemd-logind[1237]: New session 3 of user core. Mar 17 18:48:47.770741 systemd[1]: Started session-3.scope. Mar 17 18:48:47.969860 sshd[1373]: pam_unix(sshd:session): session closed for user core Mar 17 18:48:47.974112 systemd[1]: sshd@2-10.128.0.90:22-139.178.89.65:54796.service: Deactivated successfully. Mar 17 18:48:47.975204 systemd[1]: session-3.scope: Deactivated successfully. Mar 17 18:48:47.976083 systemd-logind[1237]: Session 3 logged out. Waiting for processes to exit. Mar 17 18:48:47.977276 systemd-logind[1237]: Removed session 3. Mar 17 18:48:48.014955 systemd[1]: Started sshd@3-10.128.0.90:22-139.178.89.65:54800.service. Mar 17 18:48:48.299307 sshd[1379]: Accepted publickey for core from 139.178.89.65 port 54800 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:48:48.301098 sshd[1379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:48:48.307760 systemd[1]: Started session-4.scope. Mar 17 18:48:48.308374 systemd-logind[1237]: New session 4 of user core. Mar 17 18:48:48.511892 sshd[1379]: pam_unix(sshd:session): session closed for user core Mar 17 18:48:48.516261 systemd[1]: sshd@3-10.128.0.90:22-139.178.89.65:54800.service: Deactivated successfully. Mar 17 18:48:48.517450 systemd[1]: session-4.scope: Deactivated successfully. Mar 17 18:48:48.518568 systemd-logind[1237]: Session 4 logged out. Waiting for processes to exit. Mar 17 18:48:48.519771 systemd-logind[1237]: Removed session 4. Mar 17 18:48:48.559410 systemd[1]: Started sshd@4-10.128.0.90:22-139.178.89.65:54808.service. Mar 17 18:48:48.851560 sshd[1385]: Accepted publickey for core from 139.178.89.65 port 54808 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:48:48.853237 sshd[1385]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:48:48.859635 systemd-logind[1237]: New session 5 of user core. Mar 17 18:48:48.860057 systemd[1]: Started session-5.scope. Mar 17 18:48:49.052804 sudo[1388]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Mar 17 18:48:49.053288 sudo[1388]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:48:49.062764 dbus-daemon[1180]: \xd0-\xcd\xcc\xffU: received setenforce notice (enforcing=208208176) Mar 17 18:48:49.064994 sudo[1388]: pam_unix(sudo:session): session closed for user root Mar 17 18:48:49.110439 sshd[1385]: pam_unix(sshd:session): session closed for user core Mar 17 18:48:49.115730 systemd[1]: sshd@4-10.128.0.90:22-139.178.89.65:54808.service: Deactivated successfully. Mar 17 18:48:49.116881 systemd[1]: session-5.scope: Deactivated successfully. Mar 17 18:48:49.117802 systemd-logind[1237]: Session 5 logged out. Waiting for processes to exit. Mar 17 18:48:49.119059 systemd-logind[1237]: Removed session 5. Mar 17 18:48:49.155571 systemd[1]: Started sshd@5-10.128.0.90:22-139.178.89.65:54812.service. Mar 17 18:48:49.441914 sshd[1392]: Accepted publickey for core from 139.178.89.65 port 54812 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:48:49.444018 sshd[1392]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:48:49.450730 systemd[1]: Started session-6.scope. Mar 17 18:48:49.451352 systemd-logind[1237]: New session 6 of user core. Mar 17 18:48:49.619119 sudo[1396]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Mar 17 18:48:49.619582 sudo[1396]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:48:49.624056 sudo[1396]: pam_unix(sudo:session): session closed for user root Mar 17 18:48:49.637224 sudo[1395]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Mar 17 18:48:49.637672 sudo[1395]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:48:49.650861 systemd[1]: Stopping audit-rules.service... Mar 17 18:48:49.653454 auditctl[1399]: No rules Mar 17 18:48:49.651000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:48:49.654542 systemd[1]: audit-rules.service: Deactivated successfully. Mar 17 18:48:49.654946 systemd[1]: Stopped audit-rules.service. Mar 17 18:48:49.667777 kernel: kauditd_printk_skb: 219 callbacks suppressed Mar 17 18:48:49.667948 kernel: audit: type=1305 audit(1742237329.651:200): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:48:49.659999 systemd[1]: Starting audit-rules.service... Mar 17 18:48:49.651000 audit[1399]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdec4f3bc0 a2=420 a3=0 items=0 ppid=1 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:49.651000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:48:49.716369 kernel: audit: type=1300 audit(1742237329.651:200): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdec4f3bc0 a2=420 a3=0 items=0 ppid=1 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:49.716548 kernel: audit: type=1327 audit(1742237329.651:200): proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:48:49.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.725190 augenrules[1416]: No rules Mar 17 18:48:49.726556 systemd[1]: Finished audit-rules.service. Mar 17 18:48:49.728138 sudo[1395]: pam_unix(sudo:session): session closed for user root Mar 17 18:48:49.738542 kernel: audit: type=1131 audit(1742237329.652:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.738652 kernel: audit: type=1130 audit(1742237329.725:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.725000 audit[1395]: USER_END pid=1395 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.760772 kernel: audit: type=1106 audit(1742237329.725:203): pid=1395 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.775647 sshd[1392]: pam_unix(sshd:session): session closed for user core Mar 17 18:48:49.781277 systemd-logind[1237]: Session 6 logged out. Waiting for processes to exit. Mar 17 18:48:49.783743 systemd[1]: sshd@5-10.128.0.90:22-139.178.89.65:54812.service: Deactivated successfully. Mar 17 18:48:49.784876 systemd[1]: session-6.scope: Deactivated successfully. Mar 17 18:48:49.725000 audit[1395]: CRED_DISP pid=1395 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.787407 systemd-logind[1237]: Removed session 6. Mar 17 18:48:49.808988 kernel: audit: type=1104 audit(1742237329.725:204): pid=1395 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.809164 kernel: audit: type=1106 audit(1742237329.773:205): pid=1392 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:48:49.773000 audit[1392]: USER_END pid=1392 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:48:49.866302 kernel: audit: type=1104 audit(1742237329.773:206): pid=1392 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:48:49.773000 audit[1392]: CRED_DISP pid=1392 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:48:49.849268 systemd[1]: Started sshd@6-10.128.0.90:22-139.178.89.65:54814.service. Mar 17 18:48:49.868103 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Mar 17 18:48:49.868386 systemd[1]: Stopped kubelet.service. Mar 17 18:48:49.868470 systemd[1]: kubelet.service: Consumed 1.487s CPU time. Mar 17 18:48:49.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.90:22-139.178.89.65:54812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.870843 systemd[1]: Starting kubelet.service... Mar 17 18:48:49.895622 kernel: audit: type=1131 audit(1742237329.778:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.90:22-139.178.89.65:54812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.90:22-139.178.89.65:54814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:49.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:50.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:50.140015 systemd[1]: Started kubelet.service. Mar 17 18:48:50.156000 audit[1422]: USER_ACCT pid=1422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:48:50.158195 sshd[1422]: Accepted publickey for core from 139.178.89.65 port 54814 ssh2: RSA SHA256:MwXPWHAmIHbbkjBOl9game4w0Y2Rjfi7lGZx9rtQRJk Mar 17 18:48:50.158000 audit[1422]: CRED_ACQ pid=1422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:48:50.158000 audit[1422]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c206910 a2=3 a3=0 items=0 ppid=1 pid=1422 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:50.158000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:48:50.159319 sshd[1422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:48:50.167996 systemd[1]: Started session-7.scope. Mar 17 18:48:50.169583 systemd-logind[1237]: New session 7 of user core. Mar 17 18:48:50.177000 audit[1422]: USER_START pid=1422 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:48:50.179000 audit[1433]: CRED_ACQ pid=1433 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:48:50.209391 kubelet[1428]: E0317 18:48:50.209305 1428 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:48:50.213347 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:48:50.213598 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:48:50.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 18:48:50.335000 audit[1434]: USER_ACCT pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:48:50.336104 sudo[1434]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Mar 17 18:48:50.335000 audit[1434]: CRED_REFR pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:48:50.336563 sudo[1434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:48:50.338000 audit[1434]: USER_START pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:48:50.354824 systemd[1]: Starting coreos-metadata.service... Mar 17 18:48:50.405860 coreos-metadata[1438]: Mar 17 18:48:50.405 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Mar 17 18:48:50.407792 coreos-metadata[1438]: Mar 17 18:48:50.407 INFO Fetch successful Mar 17 18:48:50.407984 coreos-metadata[1438]: Mar 17 18:48:50.407 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Mar 17 18:48:50.409138 coreos-metadata[1438]: Mar 17 18:48:50.409 INFO Fetch successful Mar 17 18:48:50.409253 coreos-metadata[1438]: Mar 17 18:48:50.409 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Mar 17 18:48:50.410307 coreos-metadata[1438]: Mar 17 18:48:50.410 INFO Fetch successful Mar 17 18:48:50.410423 coreos-metadata[1438]: Mar 17 18:48:50.410 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Mar 17 18:48:50.411599 coreos-metadata[1438]: Mar 17 18:48:50.411 INFO Fetch successful Mar 17 18:48:50.422227 systemd[1]: Finished coreos-metadata.service. Mar 17 18:48:50.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:51.374873 systemd[1]: Stopped kubelet.service. Mar 17 18:48:51.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:51.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:51.379406 systemd[1]: Starting kubelet.service... Mar 17 18:48:51.433552 systemd[1]: Reloading. Mar 17 18:48:51.596681 /usr/lib/systemd/system-generators/torcx-generator[1491]: time="2025-03-17T18:48:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:48:51.598358 /usr/lib/systemd/system-generators/torcx-generator[1491]: time="2025-03-17T18:48:51Z" level=info msg="torcx already run" Mar 17 18:48:51.721439 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:48:51.721467 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:48:51.745828 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:48:51.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit: BPF prog-id=49 op=LOAD Mar 17 18:48:51.873000 audit: BPF prog-id=44 op=UNLOAD Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit: BPF prog-id=50 op=LOAD Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.873000 audit: BPF prog-id=51 op=LOAD Mar 17 18:48:51.873000 audit: BPF prog-id=45 op=UNLOAD Mar 17 18:48:51.873000 audit: BPF prog-id=46 op=UNLOAD Mar 17 18:48:51.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.876000 audit: BPF prog-id=52 op=LOAD Mar 17 18:48:51.877000 audit: BPF prog-id=30 op=UNLOAD Mar 17 18:48:51.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit: BPF prog-id=53 op=LOAD Mar 17 18:48:51.879000 audit: BPF prog-id=31 op=UNLOAD Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit: BPF prog-id=54 op=LOAD Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.879000 audit: BPF prog-id=55 op=LOAD Mar 17 18:48:51.879000 audit: BPF prog-id=32 op=UNLOAD Mar 17 18:48:51.879000 audit: BPF prog-id=33 op=UNLOAD Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit: BPF prog-id=56 op=LOAD Mar 17 18:48:51.882000 audit: BPF prog-id=41 op=UNLOAD Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit: BPF prog-id=57 op=LOAD Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit: BPF prog-id=58 op=LOAD Mar 17 18:48:51.883000 audit: BPF prog-id=42 op=UNLOAD Mar 17 18:48:51.883000 audit: BPF prog-id=43 op=UNLOAD Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.883000 audit: BPF prog-id=59 op=LOAD Mar 17 18:48:51.883000 audit: BPF prog-id=47 op=UNLOAD Mar 17 18:48:51.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.885000 audit: BPF prog-id=60 op=LOAD Mar 17 18:48:51.885000 audit: BPF prog-id=40 op=UNLOAD Mar 17 18:48:51.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.886000 audit: BPF prog-id=61 op=LOAD Mar 17 18:48:51.886000 audit: BPF prog-id=39 op=UNLOAD Mar 17 18:48:51.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit: BPF prog-id=62 op=LOAD Mar 17 18:48:51.888000 audit: BPF prog-id=34 op=UNLOAD Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit: BPF prog-id=63 op=LOAD Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.888000 audit: BPF prog-id=64 op=LOAD Mar 17 18:48:51.888000 audit: BPF prog-id=35 op=UNLOAD Mar 17 18:48:51.888000 audit: BPF prog-id=36 op=UNLOAD Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit: BPF prog-id=65 op=LOAD Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:51.889000 audit: BPF prog-id=66 op=LOAD Mar 17 18:48:51.889000 audit: BPF prog-id=37 op=UNLOAD Mar 17 18:48:51.889000 audit: BPF prog-id=38 op=UNLOAD Mar 17 18:48:51.920904 systemd[1]: Started kubelet.service. Mar 17 18:48:51.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:51.926032 systemd[1]: Stopping kubelet.service... Mar 17 18:48:51.926806 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 18:48:51.927072 systemd[1]: Stopped kubelet.service. Mar 17 18:48:51.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:51.929656 systemd[1]: Starting kubelet.service... Mar 17 18:48:52.140640 systemd[1]: Started kubelet.service. Mar 17 18:48:52.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:52.214211 kubelet[1541]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:48:52.214644 kubelet[1541]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Mar 17 18:48:52.214725 kubelet[1541]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:48:52.214987 kubelet[1541]: I0317 18:48:52.214953 1541 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 18:48:52.710284 kubelet[1541]: I0317 18:48:52.710232 1541 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" Mar 17 18:48:52.710533 kubelet[1541]: I0317 18:48:52.710512 1541 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 18:48:52.711544 kubelet[1541]: I0317 18:48:52.711515 1541 server.go:954] "Client rotation is on, will bootstrap in background" Mar 17 18:48:52.769679 kubelet[1541]: I0317 18:48:52.769627 1541 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 18:48:52.794554 kubelet[1541]: E0317 18:48:52.794484 1541 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Mar 17 18:48:52.794821 kubelet[1541]: I0317 18:48:52.794773 1541 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Mar 17 18:48:52.798755 kubelet[1541]: I0317 18:48:52.798702 1541 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 18:48:52.799079 kubelet[1541]: I0317 18:48:52.799021 1541 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 18:48:52.799323 kubelet[1541]: I0317 18:48:52.799055 1541 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.128.0.90","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Mar 17 18:48:52.799323 kubelet[1541]: I0317 18:48:52.799313 1541 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 18:48:52.799677 kubelet[1541]: I0317 18:48:52.799331 1541 container_manager_linux.go:304] "Creating device plugin manager" Mar 17 18:48:52.799677 kubelet[1541]: I0317 18:48:52.799527 1541 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:48:52.810128 kubelet[1541]: I0317 18:48:52.810081 1541 kubelet.go:446] "Attempting to sync node with API server" Mar 17 18:48:52.810128 kubelet[1541]: I0317 18:48:52.810118 1541 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 18:48:52.810128 kubelet[1541]: I0317 18:48:52.810153 1541 kubelet.go:352] "Adding apiserver pod source" Mar 17 18:48:52.810423 kubelet[1541]: I0317 18:48:52.810170 1541 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 18:48:52.810955 kubelet[1541]: E0317 18:48:52.810902 1541 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:52.811083 kubelet[1541]: E0317 18:48:52.810961 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:52.821096 kubelet[1541]: I0317 18:48:52.821053 1541 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 18:48:52.821777 kubelet[1541]: I0317 18:48:52.821739 1541 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 18:48:52.821917 kubelet[1541]: W0317 18:48:52.821819 1541 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Mar 17 18:48:52.829913 kubelet[1541]: I0317 18:48:52.829872 1541 watchdog_linux.go:99] "Systemd watchdog is not enabled" Mar 17 18:48:52.830092 kubelet[1541]: I0317 18:48:52.829936 1541 server.go:1287] "Started kubelet" Mar 17 18:48:52.830902 kubelet[1541]: I0317 18:48:52.830837 1541 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 18:48:52.832374 kubelet[1541]: I0317 18:48:52.832323 1541 server.go:490] "Adding debug handlers to kubelet server" Mar 17 18:48:52.841202 kubelet[1541]: I0317 18:48:52.841110 1541 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 18:48:52.841694 kubelet[1541]: I0317 18:48:52.841644 1541 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 18:48:52.847000 audit[1541]: AVC avc: denied { mac_admin } for pid=1541 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:52.847000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:48:52.847000 audit[1541]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009a2c90 a1=c0006aa648 a2=c0009a2c60 a3=25 items=0 ppid=1 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:52.847000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:48:52.848000 audit[1541]: AVC avc: denied { mac_admin } for pid=1541 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:52.848000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:48:52.848000 audit[1541]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c8e960 a1=c0006aa660 a2=c0009a2d20 a3=25 items=0 ppid=1 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:52.848000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:48:52.849076 kubelet[1541]: I0317 18:48:52.848371 1541 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 18:48:52.849076 kubelet[1541]: I0317 18:48:52.848636 1541 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Mar 17 18:48:52.849076 kubelet[1541]: I0317 18:48:52.848763 1541 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 18:48:52.856356 kubelet[1541]: I0317 18:48:52.856321 1541 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Mar 17 18:48:52.860335 kubelet[1541]: I0317 18:48:52.860307 1541 volume_manager.go:297] "Starting Kubelet Volume Manager" Mar 17 18:48:52.861285 kubelet[1541]: I0317 18:48:52.860486 1541 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Mar 17 18:48:52.861460 kubelet[1541]: E0317 18:48:52.860660 1541 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.128.0.90\" not found" Mar 17 18:48:52.861745 kubelet[1541]: I0317 18:48:52.861728 1541 reconciler.go:26] "Reconciler: start to sync state" Mar 17 18:48:52.862813 kubelet[1541]: E0317 18:48:52.862717 1541 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 18:48:52.863966 kubelet[1541]: I0317 18:48:52.863944 1541 factory.go:221] Registration of the containerd container factory successfully Mar 17 18:48:52.864179 kubelet[1541]: I0317 18:48:52.864152 1541 factory.go:221] Registration of the systemd container factory successfully Mar 17 18:48:52.865306 kubelet[1541]: I0317 18:48:52.865250 1541 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 18:48:52.874354 kubelet[1541]: E0317 18:48:52.874318 1541 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.90\" not found" node="10.128.0.90" Mar 17 18:48:52.884565 kubelet[1541]: I0317 18:48:52.884488 1541 cpu_manager.go:221] "Starting CPU manager" policy="none" Mar 17 18:48:52.884565 kubelet[1541]: I0317 18:48:52.884555 1541 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Mar 17 18:48:52.884763 kubelet[1541]: I0317 18:48:52.884593 1541 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:48:52.887646 kubelet[1541]: I0317 18:48:52.887612 1541 policy_none.go:49] "None policy: Start" Mar 17 18:48:52.887785 kubelet[1541]: I0317 18:48:52.887691 1541 memory_manager.go:186] "Starting memorymanager" policy="None" Mar 17 18:48:52.887785 kubelet[1541]: I0317 18:48:52.887712 1541 state_mem.go:35] "Initializing new in-memory state store" Mar 17 18:48:52.898782 systemd[1]: Created slice kubepods.slice. Mar 17 18:48:52.913023 systemd[1]: Created slice kubepods-burstable.slice. Mar 17 18:48:52.919698 systemd[1]: Created slice kubepods-besteffort.slice. Mar 17 18:48:52.927000 audit[1558]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:52.927000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd4652c1a0 a2=0 a3=7ffd4652c18c items=0 ppid=1541 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:52.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:48:52.929000 audit[1561]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1561 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:52.929000 audit[1561]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff773cc330 a2=0 a3=7fff773cc31c items=0 ppid=1541 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:52.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:48:52.932129 kubelet[1541]: I0317 18:48:52.932062 1541 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 18:48:52.931000 audit[1541]: AVC avc: denied { mac_admin } for pid=1541 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:52.931000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:48:52.931000 audit[1541]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb9830 a1=c000ba77d0 a2=c000bb9800 a3=25 items=0 ppid=1 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:52.931000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:48:52.932618 kubelet[1541]: I0317 18:48:52.932147 1541 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 18:48:52.932618 kubelet[1541]: I0317 18:48:52.932327 1541 eviction_manager.go:189] "Eviction manager: starting control loop" Mar 17 18:48:52.932618 kubelet[1541]: I0317 18:48:52.932344 1541 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 18:48:52.936749 kubelet[1541]: I0317 18:48:52.933299 1541 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 18:48:52.937277 kubelet[1541]: E0317 18:48:52.937112 1541 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Mar 17 18:48:52.937277 kubelet[1541]: E0317 18:48:52.937163 1541 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.90\" not found" Mar 17 18:48:52.938000 audit[1563]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1563 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:52.938000 audit[1563]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff172e2b40 a2=0 a3=7fff172e2b2c items=0 ppid=1541 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:52.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:48:52.960000 audit[1568]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:52.960000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffff5b45da0 a2=0 a3=7ffff5b45d8c items=0 ppid=1541 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:52.960000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:48:53.025000 audit[1573]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:53.025000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe4f2763b0 a2=0 a3=7ffe4f27639c items=0 ppid=1541 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:53.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Mar 17 18:48:53.027298 kubelet[1541]: I0317 18:48:53.027238 1541 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 18:48:53.028000 audit[1574]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1574 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:53.028000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc0864e30 a2=0 a3=7ffcc0864e1c items=0 ppid=1541 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:53.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:48:53.029609 kubelet[1541]: I0317 18:48:53.029574 1541 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 18:48:53.029731 kubelet[1541]: I0317 18:48:53.029625 1541 status_manager.go:227] "Starting to sync pod status with apiserver" Mar 17 18:48:53.029731 kubelet[1541]: I0317 18:48:53.029663 1541 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Mar 17 18:48:53.029731 kubelet[1541]: I0317 18:48:53.029675 1541 kubelet.go:2388] "Starting kubelet main sync loop" Mar 17 18:48:53.029864 kubelet[1541]: E0317 18:48:53.029746 1541 kubelet.go:2412] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Mar 17 18:48:53.030000 audit[1575]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:53.030000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0c288870 a2=0 a3=7fff0c28885c items=0 ppid=1541 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:53.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:48:53.033138 kubelet[1541]: I0317 18:48:53.033112 1541 kubelet_node_status.go:76] "Attempting to register node" node="10.128.0.90" Mar 17 18:48:53.033000 audit[1576]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1576 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:53.033000 audit[1576]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe78cb88e0 a2=0 a3=7ffe78cb88cc items=0 ppid=1541 pid=1576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:53.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:48:53.034000 audit[1577]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:53.034000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffef6496fc0 a2=0 a3=7ffef6496fac items=0 ppid=1541 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:53.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:48:53.036000 audit[1578]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1578 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:53.036000 audit[1578]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc2d8f7240 a2=0 a3=7ffc2d8f722c items=0 ppid=1541 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:53.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:48:53.037000 audit[1579]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:53.037000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe078a3b20 a2=0 a3=7ffe078a3b0c items=0 ppid=1541 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:53.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:48:53.038000 audit[1580]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1580 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:53.038000 audit[1580]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdb05783c0 a2=0 a3=7ffdb05783ac items=0 ppid=1541 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:53.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:48:53.042887 kubelet[1541]: I0317 18:48:53.042855 1541 kubelet_node_status.go:79] "Successfully registered node" node="10.128.0.90" Mar 17 18:48:53.148453 kubelet[1541]: I0317 18:48:53.148400 1541 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Mar 17 18:48:53.148958 env[1211]: time="2025-03-17T18:48:53.148906476Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Mar 17 18:48:53.149530 kubelet[1541]: I0317 18:48:53.149180 1541 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Mar 17 18:48:53.214000 audit[1434]: USER_END pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:48:53.215327 sudo[1434]: pam_unix(sudo:session): session closed for user root Mar 17 18:48:53.216000 audit[1434]: CRED_DISP pid=1434 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:48:53.260043 sshd[1422]: pam_unix(sshd:session): session closed for user core Mar 17 18:48:53.262000 audit[1422]: USER_END pid=1422 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:48:53.262000 audit[1422]: CRED_DISP pid=1422 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 18:48:53.265112 systemd[1]: sshd@6-10.128.0.90:22-139.178.89.65:54814.service: Deactivated successfully. Mar 17 18:48:53.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.90:22-139.178.89.65:54814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:53.266437 systemd[1]: session-7.scope: Deactivated successfully. Mar 17 18:48:53.267413 systemd-logind[1237]: Session 7 logged out. Waiting for processes to exit. Mar 17 18:48:53.268893 systemd-logind[1237]: Removed session 7. Mar 17 18:48:53.713517 kubelet[1541]: I0317 18:48:53.713434 1541 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Mar 17 18:48:53.714121 kubelet[1541]: W0317 18:48:53.713738 1541 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 18:48:53.714121 kubelet[1541]: W0317 18:48:53.713789 1541 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 18:48:53.714259 kubelet[1541]: W0317 18:48:53.714205 1541 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 18:48:53.811944 kubelet[1541]: E0317 18:48:53.811866 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:53.820236 kubelet[1541]: I0317 18:48:53.820174 1541 apiserver.go:52] "Watching apiserver" Mar 17 18:48:53.826382 kubelet[1541]: E0317 18:48:53.826329 1541 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ztps5" podUID="0bab4b74-2669-4d4e-a238-ad0cfe65160a" Mar 17 18:48:53.833460 systemd[1]: Created slice kubepods-besteffort-pod09dca50b_431c_4517_993c_052ceb66af5f.slice. Mar 17 18:48:53.845099 systemd[1]: Created slice kubepods-besteffort-pod1f9c29bc_3c78_4f69_a8c9_8fd303aa3926.slice. Mar 17 18:48:53.862316 kubelet[1541]: I0317 18:48:53.862257 1541 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Mar 17 18:48:53.865622 kubelet[1541]: I0317 18:48:53.865553 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-policysync\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.865802 kubelet[1541]: I0317 18:48:53.865633 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-flexvol-driver-host\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.865802 kubelet[1541]: I0317 18:48:53.865666 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0bab4b74-2669-4d4e-a238-ad0cfe65160a-registration-dir\") pod \"csi-node-driver-ztps5\" (UID: \"0bab4b74-2669-4d4e-a238-ad0cfe65160a\") " pod="calico-system/csi-node-driver-ztps5" Mar 17 18:48:53.865802 kubelet[1541]: I0317 18:48:53.865729 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/09dca50b-431c-4517-993c-052ceb66af5f-kube-proxy\") pod \"kube-proxy-kx5mh\" (UID: \"09dca50b-431c-4517-993c-052ceb66af5f\") " pod="kube-system/kube-proxy-kx5mh" Mar 17 18:48:53.865802 kubelet[1541]: I0317 18:48:53.865757 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-xtables-lock\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.865802 kubelet[1541]: I0317 18:48:53.865783 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-cni-bin-dir\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.866083 kubelet[1541]: I0317 18:48:53.865809 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0bab4b74-2669-4d4e-a238-ad0cfe65160a-varrun\") pod \"csi-node-driver-ztps5\" (UID: \"0bab4b74-2669-4d4e-a238-ad0cfe65160a\") " pod="calico-system/csi-node-driver-ztps5" Mar 17 18:48:53.866083 kubelet[1541]: I0317 18:48:53.865837 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0bab4b74-2669-4d4e-a238-ad0cfe65160a-kubelet-dir\") pod \"csi-node-driver-ztps5\" (UID: \"0bab4b74-2669-4d4e-a238-ad0cfe65160a\") " pod="calico-system/csi-node-driver-ztps5" Mar 17 18:48:53.866083 kubelet[1541]: I0317 18:48:53.865865 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/09dca50b-431c-4517-993c-052ceb66af5f-xtables-lock\") pod \"kube-proxy-kx5mh\" (UID: \"09dca50b-431c-4517-993c-052ceb66af5f\") " pod="kube-system/kube-proxy-kx5mh" Mar 17 18:48:53.866083 kubelet[1541]: I0317 18:48:53.865891 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-tigera-ca-bundle\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.866083 kubelet[1541]: I0317 18:48:53.865918 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-var-lib-calico\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.866340 kubelet[1541]: I0317 18:48:53.865945 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0bab4b74-2669-4d4e-a238-ad0cfe65160a-socket-dir\") pod \"csi-node-driver-ztps5\" (UID: \"0bab4b74-2669-4d4e-a238-ad0cfe65160a\") " pod="calico-system/csi-node-driver-ztps5" Mar 17 18:48:53.866340 kubelet[1541]: I0317 18:48:53.865971 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rwvcv\" (UniqueName: \"kubernetes.io/projected/0bab4b74-2669-4d4e-a238-ad0cfe65160a-kube-api-access-rwvcv\") pod \"csi-node-driver-ztps5\" (UID: \"0bab4b74-2669-4d4e-a238-ad0cfe65160a\") " pod="calico-system/csi-node-driver-ztps5" Mar 17 18:48:53.866340 kubelet[1541]: I0317 18:48:53.865999 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gm5nn\" (UniqueName: \"kubernetes.io/projected/09dca50b-431c-4517-993c-052ceb66af5f-kube-api-access-gm5nn\") pod \"kube-proxy-kx5mh\" (UID: \"09dca50b-431c-4517-993c-052ceb66af5f\") " pod="kube-system/kube-proxy-kx5mh" Mar 17 18:48:53.866340 kubelet[1541]: I0317 18:48:53.866026 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-lib-modules\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.866340 kubelet[1541]: I0317 18:48:53.866051 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-node-certs\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.866610 kubelet[1541]: I0317 18:48:53.866094 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-var-run-calico\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.866610 kubelet[1541]: I0317 18:48:53.866125 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-cni-net-dir\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.866610 kubelet[1541]: I0317 18:48:53.866152 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-cni-log-dir\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.866610 kubelet[1541]: I0317 18:48:53.866178 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pntrs\" (UniqueName: \"kubernetes.io/projected/1f9c29bc-3c78-4f69-a8c9-8fd303aa3926-kube-api-access-pntrs\") pod \"calico-node-tw8wz\" (UID: \"1f9c29bc-3c78-4f69-a8c9-8fd303aa3926\") " pod="calico-system/calico-node-tw8wz" Mar 17 18:48:53.866610 kubelet[1541]: I0317 18:48:53.866205 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/09dca50b-431c-4517-993c-052ceb66af5f-lib-modules\") pod \"kube-proxy-kx5mh\" (UID: \"09dca50b-431c-4517-993c-052ceb66af5f\") " pod="kube-system/kube-proxy-kx5mh" Mar 17 18:48:53.971624 kubelet[1541]: I0317 18:48:53.969826 1541 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Mar 17 18:48:53.974382 kubelet[1541]: E0317 18:48:53.974348 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:53.974628 kubelet[1541]: W0317 18:48:53.974601 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:53.974814 kubelet[1541]: E0317 18:48:53.974793 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:54.001556 kubelet[1541]: E0317 18:48:53.999819 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:54.001556 kubelet[1541]: W0317 18:48:53.999853 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:54.001556 kubelet[1541]: E0317 18:48:53.999886 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:54.011547 kubelet[1541]: E0317 18:48:54.011230 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:54.011547 kubelet[1541]: W0317 18:48:54.011289 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:54.011547 kubelet[1541]: E0317 18:48:54.011330 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:54.012211 kubelet[1541]: E0317 18:48:54.012181 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:54.012308 kubelet[1541]: W0317 18:48:54.012234 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:54.012308 kubelet[1541]: E0317 18:48:54.012272 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:54.012701 kubelet[1541]: E0317 18:48:54.012681 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:54.012793 kubelet[1541]: W0317 18:48:54.012725 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:54.012793 kubelet[1541]: E0317 18:48:54.012750 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:54.142766 env[1211]: time="2025-03-17T18:48:54.142703202Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kx5mh,Uid:09dca50b-431c-4517-993c-052ceb66af5f,Namespace:kube-system,Attempt:0,}" Mar 17 18:48:54.153474 env[1211]: time="2025-03-17T18:48:54.153409881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tw8wz,Uid:1f9c29bc-3c78-4f69-a8c9-8fd303aa3926,Namespace:calico-system,Attempt:0,}" Mar 17 18:48:54.772449 env[1211]: time="2025-03-17T18:48:54.772373430Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:54.773878 env[1211]: time="2025-03-17T18:48:54.773831731Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:54.778489 env[1211]: time="2025-03-17T18:48:54.778437018Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:54.780588 env[1211]: time="2025-03-17T18:48:54.780534958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:54.781560 env[1211]: time="2025-03-17T18:48:54.781522955Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:54.784392 env[1211]: time="2025-03-17T18:48:54.784348284Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:54.791072 env[1211]: time="2025-03-17T18:48:54.790990141Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:54.794933 env[1211]: time="2025-03-17T18:48:54.794890165Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:54.812630 kubelet[1541]: E0317 18:48:54.812555 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:54.828040 env[1211]: time="2025-03-17T18:48:54.827921856Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:48:54.828235 env[1211]: time="2025-03-17T18:48:54.828063855Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:48:54.828235 env[1211]: time="2025-03-17T18:48:54.828104903Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:48:54.828537 env[1211]: time="2025-03-17T18:48:54.828462065Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f105b09a5fa89164979e7365cdf8c0507bda3e487028662266cb981449e9be46 pid=1608 runtime=io.containerd.runc.v2 Mar 17 18:48:54.829003 env[1211]: time="2025-03-17T18:48:54.828813932Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:48:54.829003 env[1211]: time="2025-03-17T18:48:54.828855731Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:48:54.829003 env[1211]: time="2025-03-17T18:48:54.828875425Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:48:54.829573 env[1211]: time="2025-03-17T18:48:54.829323648Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f110e32ce911edb5488070f31eb5e8ffd580a027ba1b51b6acc6ce67b0d6f326 pid=1603 runtime=io.containerd.runc.v2 Mar 17 18:48:54.853917 systemd[1]: Started cri-containerd-f105b09a5fa89164979e7365cdf8c0507bda3e487028662266cb981449e9be46.scope. Mar 17 18:48:54.864164 systemd[1]: Started cri-containerd-f110e32ce911edb5488070f31eb5e8ffd580a027ba1b51b6acc6ce67b0d6f326.scope. Mar 17 18:48:54.886518 kernel: kauditd_printk_skb: 280 callbacks suppressed Mar 17 18:48:54.886668 kernel: audit: type=1400 audit(1742237334.879:453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.952555 kernel: audit: type=1400 audit(1742237334.879:454): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.952716 kernel: audit: type=1400 audit(1742237334.879:455): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.974354 kernel: audit: type=1400 audit(1742237334.879:456): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.986919 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3024879282.mount: Deactivated successfully. Mar 17 18:48:55.009572 kernel: audit: type=1400 audit(1742237334.879:457): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.034711 kubelet[1541]: E0317 18:48:55.034323 1541 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ztps5" podUID="0bab4b74-2669-4d4e-a238-ad0cfe65160a" Mar 17 18:48:55.052531 kernel: audit: type=1400 audit(1742237334.879:458): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.052656 kernel: audit: type=1400 audit(1742237334.879:459): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.052693 kernel: audit: type=1400 audit(1742237334.879:460): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.099160 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Mar 17 18:48:55.099322 kernel: audit: type=1400 audit(1742237334.879:461): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.931000 audit: BPF prog-id=67 op=LOAD Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1608 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:54.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303562303961356661383931363439373965373336356364663863 Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1608 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:54.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303562303961356661383931363439373965373336356364663863 Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.932000 audit: BPF prog-id=68 op=LOAD Mar 17 18:48:54.932000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dd140 items=0 ppid=1608 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:54.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303562303961356661383931363439373965373336356364663863 Mar 17 18:48:54.974000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.974000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.974000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.974000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.974000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.974000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.974000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.974000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.974000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:54.974000 audit: BPF prog-id=69 op=LOAD Mar 17 18:48:54.974000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dd188 items=0 ppid=1608 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:54.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303562303961356661383931363439373965373336356364663863 Mar 17 18:48:55.013000 audit: BPF prog-id=69 op=UNLOAD Mar 17 18:48:55.013000 audit: BPF prog-id=68 op=UNLOAD Mar 17 18:48:55.013000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.013000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.013000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.013000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.013000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.013000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.013000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.013000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.013000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.051000 audit: BPF prog-id=70 op=LOAD Mar 17 18:48:55.052000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.052000 audit[1628]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1603 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:55.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313065333263653931316564623534383830373066333165623565 Mar 17 18:48:55.052000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.013000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.052000 audit[1628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1603 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:55.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313065333263653931316564623534383830373066333165623565 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit: BPF prog-id=72 op=LOAD Mar 17 18:48:55.100000 audit[1628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000301050 items=0 ppid=1603 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:55.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313065333263653931316564623534383830373066333165623565 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit: BPF prog-id=73 op=LOAD Mar 17 18:48:55.100000 audit[1628]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000301098 items=0 ppid=1603 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:55.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313065333263653931316564623534383830373066333165623565 Mar 17 18:48:55.100000 audit: BPF prog-id=73 op=UNLOAD Mar 17 18:48:55.100000 audit: BPF prog-id=72 op=UNLOAD Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { perfmon } for pid=1628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit[1628]: AVC avc: denied { bpf } for pid=1628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:55.100000 audit: BPF prog-id=74 op=LOAD Mar 17 18:48:55.100000 audit[1628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003014a8 items=0 ppid=1603 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:55.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313065333263653931316564623534383830373066333165623565 Mar 17 18:48:55.013000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001dd598 items=0 ppid=1608 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:55.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303562303961356661383931363439373965373336356364663863 Mar 17 18:48:55.134113 env[1211]: time="2025-03-17T18:48:55.134045161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kx5mh,Uid:09dca50b-431c-4517-993c-052ceb66af5f,Namespace:kube-system,Attempt:0,} returns sandbox id \"f110e32ce911edb5488070f31eb5e8ffd580a027ba1b51b6acc6ce67b0d6f326\"" Mar 17 18:48:55.138745 env[1211]: time="2025-03-17T18:48:55.138689176Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.3\"" Mar 17 18:48:55.140323 env[1211]: time="2025-03-17T18:48:55.140273002Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tw8wz,Uid:1f9c29bc-3c78-4f69-a8c9-8fd303aa3926,Namespace:calico-system,Attempt:0,} returns sandbox id \"f105b09a5fa89164979e7365cdf8c0507bda3e487028662266cb981449e9be46\"" Mar 17 18:48:55.813760 kubelet[1541]: E0317 18:48:55.813677 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:56.264646 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1919881800.mount: Deactivated successfully. Mar 17 18:48:56.814877 kubelet[1541]: E0317 18:48:56.814797 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:57.031907 kubelet[1541]: E0317 18:48:57.031854 1541 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ztps5" podUID="0bab4b74-2669-4d4e-a238-ad0cfe65160a" Mar 17 18:48:57.077722 env[1211]: time="2025-03-17T18:48:57.077538442Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:57.081238 env[1211]: time="2025-03-17T18:48:57.081184208Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1ae78fd2f9d8fc345928378dc947c7f1e95f01c1a552781827071867a95d09c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:57.083859 env[1211]: time="2025-03-17T18:48:57.083803277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:57.085896 env[1211]: time="2025-03-17T18:48:57.085834603Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:5015269547a0b7dd2c062758e9a64467b58978ff2502cad4c3f5cdf4aa554ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:57.086469 env[1211]: time="2025-03-17T18:48:57.086415399Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.3\" returns image reference \"sha256:a1ae78fd2f9d8fc345928378dc947c7f1e95f01c1a552781827071867a95d09c\"" Mar 17 18:48:57.089523 env[1211]: time="2025-03-17T18:48:57.089092109Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Mar 17 18:48:57.090296 env[1211]: time="2025-03-17T18:48:57.090239730Z" level=info msg="CreateContainer within sandbox \"f110e32ce911edb5488070f31eb5e8ffd580a027ba1b51b6acc6ce67b0d6f326\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Mar 17 18:48:57.108725 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3552520300.mount: Deactivated successfully. Mar 17 18:48:57.120075 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1483355834.mount: Deactivated successfully. Mar 17 18:48:57.123249 env[1211]: time="2025-03-17T18:48:57.123192827Z" level=info msg="CreateContainer within sandbox \"f110e32ce911edb5488070f31eb5e8ffd580a027ba1b51b6acc6ce67b0d6f326\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"43fad7449ca145c1f70156e74549ca9374b42f62c7531049ca8d6de1f361a0e1\"" Mar 17 18:48:57.124253 env[1211]: time="2025-03-17T18:48:57.124214252Z" level=info msg="StartContainer for \"43fad7449ca145c1f70156e74549ca9374b42f62c7531049ca8d6de1f361a0e1\"" Mar 17 18:48:57.148913 systemd[1]: Started cri-containerd-43fad7449ca145c1f70156e74549ca9374b42f62c7531049ca8d6de1f361a0e1.scope. Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6aba323228 items=0 ppid=1603 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433666164373434396361313435633166373031353665373435343963 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit: BPF prog-id=75 op=LOAD Mar 17 18:48:57.175000 audit[1682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c5c88 items=0 ppid=1603 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433666164373434396361313435633166373031353665373435343963 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit: BPF prog-id=76 op=LOAD Mar 17 18:48:57.175000 audit[1682]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002c5cd8 items=0 ppid=1603 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433666164373434396361313435633166373031353665373435343963 Mar 17 18:48:57.175000 audit: BPF prog-id=76 op=UNLOAD Mar 17 18:48:57.175000 audit: BPF prog-id=75 op=UNLOAD Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:57.175000 audit: BPF prog-id=77 op=LOAD Mar 17 18:48:57.175000 audit[1682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002c5d68 items=0 ppid=1603 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433666164373434396361313435633166373031353665373435343963 Mar 17 18:48:57.197953 env[1211]: time="2025-03-17T18:48:57.197894255Z" level=info msg="StartContainer for \"43fad7449ca145c1f70156e74549ca9374b42f62c7531049ca8d6de1f361a0e1\" returns successfully" Mar 17 18:48:57.359000 audit[1740]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.359000 audit[1741]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.359000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5712ba40 a2=0 a3=7ffd5712ba2c items=0 ppid=1692 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.359000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:48:57.361000 audit[1742]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.361000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2fff03c0 a2=0 a3=7fff2fff03ac items=0 ppid=1692 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:48:57.359000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb9ddc380 a2=0 a3=7ffeb9ddc36c items=0 ppid=1692 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:48:57.363000 audit[1743]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.363000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe38db1290 a2=0 a3=7ffe38db127c items=0 ppid=1692 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:48:57.366000 audit[1744]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.366000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd76e09e50 a2=0 a3=7ffd76e09e3c items=0 ppid=1692 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:48:57.370000 audit[1745]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.370000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5daed450 a2=0 a3=7ffe5daed43c items=0 ppid=1692 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:48:57.466000 audit[1746]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.466000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff80bbb4f0 a2=0 a3=7fff80bbb4dc items=0 ppid=1692 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:48:57.470000 audit[1748]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.470000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd1c7c5230 a2=0 a3=7ffd1c7c521c items=0 ppid=1692 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Mar 17 18:48:57.475000 audit[1751]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.475000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffcf4430b0 a2=0 a3=7fffcf44309c items=0 ppid=1692 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Mar 17 18:48:57.477000 audit[1752]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.477000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea6ebc590 a2=0 a3=7ffea6ebc57c items=0 ppid=1692 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:48:57.481000 audit[1754]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.481000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc0ba5f960 a2=0 a3=7ffc0ba5f94c items=0 ppid=1692 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:48:57.484000 audit[1755]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.484000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb3acfe40 a2=0 a3=7fffb3acfe2c items=0 ppid=1692 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:48:57.488000 audit[1757]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.488000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff336dc4f0 a2=0 a3=7fff336dc4dc items=0 ppid=1692 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:48:57.494000 audit[1760]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.494000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc8b325cf0 a2=0 a3=7ffc8b325cdc items=0 ppid=1692 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Mar 17 18:48:57.496000 audit[1761]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.496000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8af091a0 a2=0 a3=7ffd8af0918c items=0 ppid=1692 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:48:57.500000 audit[1763]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.500000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc17a12790 a2=0 a3=7ffc17a1277c items=0 ppid=1692 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.500000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:48:57.502000 audit[1764]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.502000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff222cf340 a2=0 a3=7fff222cf32c items=0 ppid=1692 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:48:57.506000 audit[1766]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.506000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2732b9c0 a2=0 a3=7ffe2732b9ac items=0 ppid=1692 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:48:57.511000 audit[1769]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.511000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1ceb5c30 a2=0 a3=7ffd1ceb5c1c items=0 ppid=1692 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:48:57.518000 audit[1772]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.518000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc28b13800 a2=0 a3=7ffc28b137ec items=0 ppid=1692 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.518000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:48:57.520000 audit[1773]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.520000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe286fef50 a2=0 a3=7ffe286fef3c items=0 ppid=1692 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:48:57.523000 audit[1775]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.523000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc595d3d80 a2=0 a3=7ffc595d3d6c items=0 ppid=1692 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:48:57.558000 audit[1779]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.558000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffffa058e50 a2=0 a3=7ffffa058e3c items=0 ppid=1692 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:48:57.560000 audit[1780]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.560000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff31bf3230 a2=0 a3=7fff31bf321c items=0 ppid=1692 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:48:57.564000 audit[1782]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:48:57.564000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffea4613f30 a2=0 a3=7ffea4613f1c items=0 ppid=1692 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:48:57.592000 audit[1788]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:57.592000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffca890d530 a2=0 a3=7ffca890d51c items=0 ppid=1692 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:57.624000 audit[1788]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:57.624000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffca890d530 a2=0 a3=7ffca890d51c items=0 ppid=1692 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:57.649000 audit[1796]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.649000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd1fcf1650 a2=0 a3=7ffd1fcf163c items=0 ppid=1692 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:48:57.653000 audit[1798]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.653000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff66ec8dc0 a2=0 a3=7fff66ec8dac items=0 ppid=1692 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Mar 17 18:48:57.659000 audit[1801]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.659000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe989e5d50 a2=0 a3=7ffe989e5d3c items=0 ppid=1692 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Mar 17 18:48:57.661000 audit[1802]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.661000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2f85a0e0 a2=0 a3=7fff2f85a0cc items=0 ppid=1692 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.661000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:48:57.665000 audit[1804]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.665000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7e7c2530 a2=0 a3=7ffe7e7c251c items=0 ppid=1692 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:48:57.666000 audit[1805]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.666000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd66500e00 a2=0 a3=7ffd66500dec items=0 ppid=1692 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:48:57.671000 audit[1807]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.671000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcacb803a0 a2=0 a3=7ffcacb8038c items=0 ppid=1692 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Mar 17 18:48:57.679000 audit[1810]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.679000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe79073970 a2=0 a3=7ffe7907395c items=0 ppid=1692 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:48:57.681000 audit[1811]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.681000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9da98720 a2=0 a3=7ffd9da9870c items=0 ppid=1692 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:48:57.685000 audit[1813]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.685000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd300039e0 a2=0 a3=7ffd300039cc items=0 ppid=1692 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:48:57.687000 audit[1814]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.687000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde0299a40 a2=0 a3=7ffde0299a2c items=0 ppid=1692 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:48:57.691000 audit[1816]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.691000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb910d780 a2=0 a3=7ffcb910d76c items=0 ppid=1692 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:48:57.696000 audit[1819]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.696000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1ac42b50 a2=0 a3=7ffd1ac42b3c items=0 ppid=1692 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.696000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:48:57.703000 audit[1822]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.703000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe51256480 a2=0 a3=7ffe5125646c items=0 ppid=1692 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Mar 17 18:48:57.705000 audit[1823]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.705000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc7d6716d0 a2=0 a3=7ffc7d6716bc items=0 ppid=1692 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:48:57.709000 audit[1825]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.709000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcbfbe12a0 a2=0 a3=7ffcbfbe128c items=0 ppid=1692 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.709000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:48:57.714000 audit[1828]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.714000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff26cb0ca0 a2=0 a3=7fff26cb0c8c items=0 ppid=1692 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:48:57.716000 audit[1829]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.716000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff89687140 a2=0 a3=7fff8968712c items=0 ppid=1692 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:48:57.720000 audit[1831]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.720000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe285e09b0 a2=0 a3=7ffe285e099c items=0 ppid=1692 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.720000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:48:57.721000 audit[1832]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.721000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe04f21f0 a2=0 a3=7fffe04f21dc items=0 ppid=1692 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.721000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:48:57.725000 audit[1834]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.725000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcda0a4c00 a2=0 a3=7ffcda0a4bec items=0 ppid=1692 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:48:57.733000 audit[1837]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:48:57.733000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea4f82190 a2=0 a3=7ffea4f8217c items=0 ppid=1692 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:48:57.737000 audit[1839]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:48:57.737000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff6f561a60 a2=0 a3=7fff6f561a4c items=0 ppid=1692 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.737000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:57.738000 audit[1839]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:48:57.738000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff6f561a60 a2=0 a3=7fff6f561a4c items=0 ppid=1692 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:57.738000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:57.815541 kubelet[1541]: E0317 18:48:57.815406 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:58.060281 kubelet[1541]: I0317 18:48:58.060201 1541 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-kx5mh" podStartSLOduration=3.110220117 podStartE2EDuration="5.060179306s" podCreationTimestamp="2025-03-17 18:48:53 +0000 UTC" firstStartedPulling="2025-03-17 18:48:55.137916141 +0000 UTC m=+2.990337560" lastFinishedPulling="2025-03-17 18:48:57.087875317 +0000 UTC m=+4.940296749" observedRunningTime="2025-03-17 18:48:58.059711923 +0000 UTC m=+5.912133368" watchObservedRunningTime="2025-03-17 18:48:58.060179306 +0000 UTC m=+5.912600781" Mar 17 18:48:58.133243 kubelet[1541]: E0317 18:48:58.133160 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.133243 kubelet[1541]: W0317 18:48:58.133204 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.133243 kubelet[1541]: E0317 18:48:58.133245 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.134452 kubelet[1541]: E0317 18:48:58.134000 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.134452 kubelet[1541]: W0317 18:48:58.134026 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.134452 kubelet[1541]: E0317 18:48:58.134057 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.134452 kubelet[1541]: E0317 18:48:58.134391 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.134452 kubelet[1541]: W0317 18:48:58.134406 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.134829 kubelet[1541]: E0317 18:48:58.134775 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.135224 kubelet[1541]: E0317 18:48:58.135204 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.135360 kubelet[1541]: W0317 18:48:58.135339 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.135484 kubelet[1541]: E0317 18:48:58.135465 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.136001 kubelet[1541]: E0317 18:48:58.135978 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.136001 kubelet[1541]: W0317 18:48:58.135997 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.136153 kubelet[1541]: E0317 18:48:58.136016 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.136368 kubelet[1541]: E0317 18:48:58.136325 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.136368 kubelet[1541]: W0317 18:48:58.136344 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.136368 kubelet[1541]: E0317 18:48:58.136361 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.136696 kubelet[1541]: E0317 18:48:58.136676 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.136696 kubelet[1541]: W0317 18:48:58.136694 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.136834 kubelet[1541]: E0317 18:48:58.136710 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.137114 kubelet[1541]: E0317 18:48:58.137060 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.137114 kubelet[1541]: W0317 18:48:58.137080 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.137114 kubelet[1541]: E0317 18:48:58.137097 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.137466 kubelet[1541]: E0317 18:48:58.137441 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.137466 kubelet[1541]: W0317 18:48:58.137461 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.137652 kubelet[1541]: E0317 18:48:58.137479 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.137967 kubelet[1541]: E0317 18:48:58.137944 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.138076 kubelet[1541]: W0317 18:48:58.137969 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.138076 kubelet[1541]: E0317 18:48:58.137988 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.138379 kubelet[1541]: E0317 18:48:58.138358 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.138379 kubelet[1541]: W0317 18:48:58.138376 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.138562 kubelet[1541]: E0317 18:48:58.138394 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.138764 kubelet[1541]: E0317 18:48:58.138742 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.138764 kubelet[1541]: W0317 18:48:58.138760 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.138950 kubelet[1541]: E0317 18:48:58.138777 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.139129 kubelet[1541]: E0317 18:48:58.139104 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.139129 kubelet[1541]: W0317 18:48:58.139127 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.139282 kubelet[1541]: E0317 18:48:58.139144 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.139451 kubelet[1541]: E0317 18:48:58.139419 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.139451 kubelet[1541]: W0317 18:48:58.139439 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.139632 kubelet[1541]: E0317 18:48:58.139455 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.139808 kubelet[1541]: E0317 18:48:58.139776 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.139925 kubelet[1541]: W0317 18:48:58.139901 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.140021 kubelet[1541]: E0317 18:48:58.139928 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.140276 kubelet[1541]: E0317 18:48:58.140249 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.140356 kubelet[1541]: W0317 18:48:58.140293 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.140356 kubelet[1541]: E0317 18:48:58.140312 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.140862 kubelet[1541]: E0317 18:48:58.140838 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.140862 kubelet[1541]: W0317 18:48:58.140860 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.141004 kubelet[1541]: E0317 18:48:58.140878 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.151189 kubelet[1541]: E0317 18:48:58.141268 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.151189 kubelet[1541]: W0317 18:48:58.141284 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.151189 kubelet[1541]: E0317 18:48:58.141300 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.151189 kubelet[1541]: E0317 18:48:58.143349 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.151189 kubelet[1541]: W0317 18:48:58.143394 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.151189 kubelet[1541]: E0317 18:48:58.143415 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.151189 kubelet[1541]: E0317 18:48:58.143843 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.151189 kubelet[1541]: W0317 18:48:58.143885 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.151189 kubelet[1541]: E0317 18:48:58.143906 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.151189 kubelet[1541]: E0317 18:48:58.144534 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.152129 kubelet[1541]: W0317 18:48:58.144554 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.152129 kubelet[1541]: E0317 18:48:58.144571 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.152129 kubelet[1541]: E0317 18:48:58.145045 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.152129 kubelet[1541]: W0317 18:48:58.145066 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.152129 kubelet[1541]: E0317 18:48:58.145116 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.152129 kubelet[1541]: E0317 18:48:58.145578 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.152129 kubelet[1541]: W0317 18:48:58.145593 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.152129 kubelet[1541]: E0317 18:48:58.145646 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.152129 kubelet[1541]: E0317 18:48:58.146073 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.152129 kubelet[1541]: W0317 18:48:58.146088 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.152689 kubelet[1541]: E0317 18:48:58.146212 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.152689 kubelet[1541]: E0317 18:48:58.146553 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.152689 kubelet[1541]: W0317 18:48:58.146567 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.152689 kubelet[1541]: E0317 18:48:58.146616 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.152689 kubelet[1541]: E0317 18:48:58.147017 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.152689 kubelet[1541]: W0317 18:48:58.147034 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.152689 kubelet[1541]: E0317 18:48:58.147068 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.152689 kubelet[1541]: E0317 18:48:58.147403 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.152689 kubelet[1541]: W0317 18:48:58.147416 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.152689 kubelet[1541]: E0317 18:48:58.147437 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.153027 kubelet[1541]: E0317 18:48:58.147848 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.153027 kubelet[1541]: W0317 18:48:58.147863 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.153027 kubelet[1541]: E0317 18:48:58.147885 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.153027 kubelet[1541]: E0317 18:48:58.148528 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.153027 kubelet[1541]: W0317 18:48:58.148544 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.153027 kubelet[1541]: E0317 18:48:58.148664 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.153027 kubelet[1541]: E0317 18:48:58.148883 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.153027 kubelet[1541]: W0317 18:48:58.148896 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.153027 kubelet[1541]: E0317 18:48:58.148912 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.153027 kubelet[1541]: E0317 18:48:58.149240 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.153320 kubelet[1541]: W0317 18:48:58.149254 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.153320 kubelet[1541]: E0317 18:48:58.149274 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.153320 kubelet[1541]: E0317 18:48:58.149901 1541 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:48:58.153320 kubelet[1541]: W0317 18:48:58.149915 1541 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:48:58.153320 kubelet[1541]: E0317 18:48:58.149931 1541 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:48:58.212232 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2219693950.mount: Deactivated successfully. Mar 17 18:48:58.386375 env[1211]: time="2025-03-17T18:48:58.383596942Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:58.389583 env[1211]: time="2025-03-17T18:48:58.389533156Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:58.392180 env[1211]: time="2025-03-17T18:48:58.392114241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:58.394483 env[1211]: time="2025-03-17T18:48:58.394421472Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:58.395418 env[1211]: time="2025-03-17T18:48:58.395372365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Mar 17 18:48:58.398971 env[1211]: time="2025-03-17T18:48:58.398925337Z" level=info msg="CreateContainer within sandbox \"f105b09a5fa89164979e7365cdf8c0507bda3e487028662266cb981449e9be46\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 18:48:58.418640 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2172524289.mount: Deactivated successfully. Mar 17 18:48:58.425901 env[1211]: time="2025-03-17T18:48:58.425840521Z" level=info msg="CreateContainer within sandbox \"f105b09a5fa89164979e7365cdf8c0507bda3e487028662266cb981449e9be46\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"872160ebbc0263ebecd1249e1712c2af0a498c448fe90e6cb2b10bc59e1ed190\"" Mar 17 18:48:58.426974 env[1211]: time="2025-03-17T18:48:58.426932941Z" level=info msg="StartContainer for \"872160ebbc0263ebecd1249e1712c2af0a498c448fe90e6cb2b10bc59e1ed190\"" Mar 17 18:48:58.466551 systemd[1]: Started cri-containerd-872160ebbc0263ebecd1249e1712c2af0a498c448fe90e6cb2b10bc59e1ed190.scope. Mar 17 18:48:58.486000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.486000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f96939e0e18 items=0 ppid=1608 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:58.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837323136306562626330323633656265636431323439653137313263 Mar 17 18:48:58.486000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.486000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.486000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.486000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.486000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.486000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.486000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.486000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.486000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.486000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.486000 audit: BPF prog-id=78 op=LOAD Mar 17 18:48:58.486000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000098a48 items=0 ppid=1608 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:58.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837323136306562626330323633656265636431323439653137313263 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit: BPF prog-id=79 op=LOAD Mar 17 18:48:58.487000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000098a98 items=0 ppid=1608 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:58.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837323136306562626330323633656265636431323439653137313263 Mar 17 18:48:58.487000 audit: BPF prog-id=79 op=UNLOAD Mar 17 18:48:58.487000 audit: BPF prog-id=78 op=UNLOAD Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:58.487000 audit: BPF prog-id=80 op=LOAD Mar 17 18:48:58.487000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000098b28 items=0 ppid=1608 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:58.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837323136306562626330323633656265636431323439653137313263 Mar 17 18:48:58.514756 env[1211]: time="2025-03-17T18:48:58.514690737Z" level=info msg="StartContainer for \"872160ebbc0263ebecd1249e1712c2af0a498c448fe90e6cb2b10bc59e1ed190\" returns successfully" Mar 17 18:48:58.527199 systemd[1]: cri-containerd-872160ebbc0263ebecd1249e1712c2af0a498c448fe90e6cb2b10bc59e1ed190.scope: Deactivated successfully. Mar 17 18:48:58.528000 audit: BPF prog-id=80 op=UNLOAD Mar 17 18:48:58.561592 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-872160ebbc0263ebecd1249e1712c2af0a498c448fe90e6cb2b10bc59e1ed190-rootfs.mount: Deactivated successfully. Mar 17 18:48:58.816228 kubelet[1541]: E0317 18:48:58.816147 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:58.979402 env[1211]: time="2025-03-17T18:48:58.979312567Z" level=info msg="shim disconnected" id=872160ebbc0263ebecd1249e1712c2af0a498c448fe90e6cb2b10bc59e1ed190 Mar 17 18:48:58.979402 env[1211]: time="2025-03-17T18:48:58.979377523Z" level=warning msg="cleaning up after shim disconnected" id=872160ebbc0263ebecd1249e1712c2af0a498c448fe90e6cb2b10bc59e1ed190 namespace=k8s.io Mar 17 18:48:58.979402 env[1211]: time="2025-03-17T18:48:58.979393850Z" level=info msg="cleaning up dead shim" Mar 17 18:48:58.991754 env[1211]: time="2025-03-17T18:48:58.991678443Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:48:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1919 runtime=io.containerd.runc.v2\n" Mar 17 18:48:59.031257 kubelet[1541]: E0317 18:48:59.030754 1541 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ztps5" podUID="0bab4b74-2669-4d4e-a238-ad0cfe65160a" Mar 17 18:48:59.052863 env[1211]: time="2025-03-17T18:48:59.052813327Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Mar 17 18:48:59.817073 kubelet[1541]: E0317 18:48:59.817022 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:00.818016 kubelet[1541]: E0317 18:49:00.817942 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:01.031668 kubelet[1541]: E0317 18:49:01.031100 1541 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ztps5" podUID="0bab4b74-2669-4d4e-a238-ad0cfe65160a" Mar 17 18:49:01.818376 kubelet[1541]: E0317 18:49:01.818280 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:02.819548 kubelet[1541]: E0317 18:49:02.819435 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:03.040666 kubelet[1541]: E0317 18:49:03.040620 1541 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ztps5" podUID="0bab4b74-2669-4d4e-a238-ad0cfe65160a" Mar 17 18:49:03.564708 env[1211]: time="2025-03-17T18:49:03.564596999Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:03.568427 env[1211]: time="2025-03-17T18:49:03.568371516Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:03.571289 env[1211]: time="2025-03-17T18:49:03.571232633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:03.574229 env[1211]: time="2025-03-17T18:49:03.574178496Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:03.575088 env[1211]: time="2025-03-17T18:49:03.575023921Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Mar 17 18:49:03.578980 env[1211]: time="2025-03-17T18:49:03.578918449Z" level=info msg="CreateContainer within sandbox \"f105b09a5fa89164979e7365cdf8c0507bda3e487028662266cb981449e9be46\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 18:49:03.599849 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3279021600.mount: Deactivated successfully. Mar 17 18:49:03.610717 env[1211]: time="2025-03-17T18:49:03.610632383Z" level=info msg="CreateContainer within sandbox \"f105b09a5fa89164979e7365cdf8c0507bda3e487028662266cb981449e9be46\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"45f0213960d52c42ad43a2ceabd1946331c3d79810e0da1e95e1a9be1d48c638\"" Mar 17 18:49:03.611790 env[1211]: time="2025-03-17T18:49:03.611727738Z" level=info msg="StartContainer for \"45f0213960d52c42ad43a2ceabd1946331c3d79810e0da1e95e1a9be1d48c638\"" Mar 17 18:49:03.653347 systemd[1]: Started cri-containerd-45f0213960d52c42ad43a2ceabd1946331c3d79810e0da1e95e1a9be1d48c638.scope. Mar 17 18:49:03.703694 kernel: kauditd_printk_skb: 346 callbacks suppressed Mar 17 18:49:03.703889 kernel: audit: type=1400 audit(1742237343.676:553): avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.676000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.676000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f025f7ed578 items=0 ppid=1608 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:03.739569 kernel: audit: type=1300 audit(1742237343.676:553): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f025f7ed578 items=0 ppid=1608 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:03.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663032313339363064353263343261643433613263656162643139 Mar 17 18:49:03.769567 kernel: audit: type=1327 audit(1742237343.676:553): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663032313339363064353263343261643433613263656162643139 Mar 17 18:49:03.676000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.791693 kernel: audit: type=1400 audit(1742237343.676:554): avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.676000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.808222 env[1211]: time="2025-03-17T18:49:03.808113270Z" level=info msg="StartContainer for \"45f0213960d52c42ad43a2ceabd1946331c3d79810e0da1e95e1a9be1d48c638\" returns successfully" Mar 17 18:49:03.813530 kernel: audit: type=1400 audit(1742237343.676:554): avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.676000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.836078 kubelet[1541]: E0317 18:49:03.836001 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:03.676000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.857351 kernel: audit: type=1400 audit(1742237343.676:554): avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.857574 kernel: audit: type=1400 audit(1742237343.676:554): avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.857633 kernel: audit: type=1400 audit(1742237343.676:554): avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.676000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.676000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.900002 kernel: audit: type=1400 audit(1742237343.676:554): avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.900179 kernel: audit: type=1400 audit(1742237343.676:554): avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.676000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.676000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.676000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.676000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.676000 audit: BPF prog-id=81 op=LOAD Mar 17 18:49:03.676000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027c398 items=0 ppid=1608 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:03.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663032313339363064353263343261643433613263656162643139 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit: BPF prog-id=82 op=LOAD Mar 17 18:49:03.703000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027c3e8 items=0 ppid=1608 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:03.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663032313339363064353263343261643433613263656162643139 Mar 17 18:49:03.703000 audit: BPF prog-id=82 op=UNLOAD Mar 17 18:49:03.703000 audit: BPF prog-id=81 op=UNLOAD Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:03.703000 audit: BPF prog-id=83 op=LOAD Mar 17 18:49:03.703000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027c478 items=0 ppid=1608 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:03.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663032313339363064353263343261643433613263656162643139 Mar 17 18:49:04.699982 env[1211]: time="2025-03-17T18:49:04.699898392Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:49:04.702882 systemd[1]: cri-containerd-45f0213960d52c42ad43a2ceabd1946331c3d79810e0da1e95e1a9be1d48c638.scope: Deactivated successfully. Mar 17 18:49:04.704000 audit: BPF prog-id=83 op=UNLOAD Mar 17 18:49:04.731827 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-45f0213960d52c42ad43a2ceabd1946331c3d79810e0da1e95e1a9be1d48c638-rootfs.mount: Deactivated successfully. Mar 17 18:49:04.741823 kubelet[1541]: I0317 18:49:04.741736 1541 kubelet_node_status.go:502] "Fast updating node status as it just became ready" Mar 17 18:49:04.836658 kubelet[1541]: E0317 18:49:04.836586 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:05.037750 systemd[1]: Created slice kubepods-besteffort-pod0bab4b74_2669_4d4e_a238_ad0cfe65160a.slice. Mar 17 18:49:05.041871 env[1211]: time="2025-03-17T18:49:05.041822062Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ztps5,Uid:0bab4b74-2669-4d4e-a238-ad0cfe65160a,Namespace:calico-system,Attempt:0,}" Mar 17 18:49:05.503924 env[1211]: time="2025-03-17T18:49:05.503846598Z" level=info msg="shim disconnected" id=45f0213960d52c42ad43a2ceabd1946331c3d79810e0da1e95e1a9be1d48c638 Mar 17 18:49:05.503924 env[1211]: time="2025-03-17T18:49:05.503912167Z" level=warning msg="cleaning up after shim disconnected" id=45f0213960d52c42ad43a2ceabd1946331c3d79810e0da1e95e1a9be1d48c638 namespace=k8s.io Mar 17 18:49:05.503924 env[1211]: time="2025-03-17T18:49:05.503927057Z" level=info msg="cleaning up dead shim" Mar 17 18:49:05.528738 env[1211]: time="2025-03-17T18:49:05.528681329Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:49:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1983 runtime=io.containerd.runc.v2\n" Mar 17 18:49:05.596849 env[1211]: time="2025-03-17T18:49:05.596745030Z" level=error msg="Failed to destroy network for sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:49:05.599604 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc-shm.mount: Deactivated successfully. Mar 17 18:49:05.600989 env[1211]: time="2025-03-17T18:49:05.600927491Z" level=error msg="encountered an error cleaning up failed sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:49:05.601261 env[1211]: time="2025-03-17T18:49:05.601206466Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ztps5,Uid:0bab4b74-2669-4d4e-a238-ad0cfe65160a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:49:05.601712 kubelet[1541]: E0317 18:49:05.601652 1541 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:49:05.601869 kubelet[1541]: E0317 18:49:05.601735 1541 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ztps5" Mar 17 18:49:05.601869 kubelet[1541]: E0317 18:49:05.601771 1541 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ztps5" Mar 17 18:49:05.602006 kubelet[1541]: E0317 18:49:05.601847 1541 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ztps5_calico-system(0bab4b74-2669-4d4e-a238-ad0cfe65160a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ztps5_calico-system(0bab4b74-2669-4d4e-a238-ad0cfe65160a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ztps5" podUID="0bab4b74-2669-4d4e-a238-ad0cfe65160a" Mar 17 18:49:05.837124 kubelet[1541]: E0317 18:49:05.836892 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:05.917256 systemd[1]: Created slice kubepods-besteffort-pod0cedc8dd_b3d5_4a8b_aa77_1ad04d4cc766.slice. Mar 17 18:49:05.935818 kubelet[1541]: I0317 18:49:05.935744 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fp26b\" (UniqueName: \"kubernetes.io/projected/0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766-kube-api-access-fp26b\") pod \"nginx-deployment-7fcdb87857-cpg67\" (UID: \"0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766\") " pod="default/nginx-deployment-7fcdb87857-cpg67" Mar 17 18:49:06.072480 kubelet[1541]: I0317 18:49:06.072438 1541 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:06.072890 env[1211]: time="2025-03-17T18:49:06.072846079Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Mar 17 18:49:06.074044 env[1211]: time="2025-03-17T18:49:06.074002315Z" level=info msg="StopPodSandbox for \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\"" Mar 17 18:49:06.117775 env[1211]: time="2025-03-17T18:49:06.117095876Z" level=error msg="StopPodSandbox for \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\" failed" error="failed to destroy network for sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:49:06.117990 kubelet[1541]: E0317 18:49:06.117469 1541 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:06.117990 kubelet[1541]: E0317 18:49:06.117600 1541 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc"} Mar 17 18:49:06.117990 kubelet[1541]: E0317 18:49:06.117688 1541 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0bab4b74-2669-4d4e-a238-ad0cfe65160a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:49:06.117990 kubelet[1541]: E0317 18:49:06.117726 1541 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0bab4b74-2669-4d4e-a238-ad0cfe65160a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ztps5" podUID="0bab4b74-2669-4d4e-a238-ad0cfe65160a" Mar 17 18:49:06.223821 env[1211]: time="2025-03-17T18:49:06.223750141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-cpg67,Uid:0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766,Namespace:default,Attempt:0,}" Mar 17 18:49:06.324660 env[1211]: time="2025-03-17T18:49:06.324586421Z" level=error msg="Failed to destroy network for sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:49:06.329379 env[1211]: time="2025-03-17T18:49:06.327752018Z" level=error msg="encountered an error cleaning up failed sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:49:06.329379 env[1211]: time="2025-03-17T18:49:06.327833255Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-cpg67,Uid:0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:49:06.329605 kubelet[1541]: E0317 18:49:06.328202 1541 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:49:06.329605 kubelet[1541]: E0317 18:49:06.328296 1541 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-cpg67" Mar 17 18:49:06.329605 kubelet[1541]: E0317 18:49:06.328352 1541 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-cpg67" Mar 17 18:49:06.327437 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a-shm.mount: Deactivated successfully. Mar 17 18:49:06.329825 kubelet[1541]: E0317 18:49:06.328438 1541 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-cpg67_default(0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-cpg67_default(0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-cpg67" podUID="0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766" Mar 17 18:49:06.837822 kubelet[1541]: E0317 18:49:06.837751 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:06.995137 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Mar 17 18:49:06.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:07.018000 audit: BPF prog-id=58 op=UNLOAD Mar 17 18:49:07.018000 audit: BPF prog-id=57 op=UNLOAD Mar 17 18:49:07.018000 audit: BPF prog-id=56 op=UNLOAD Mar 17 18:49:07.075705 kubelet[1541]: I0317 18:49:07.075637 1541 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:07.076749 env[1211]: time="2025-03-17T18:49:07.076681945Z" level=info msg="StopPodSandbox for \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\"" Mar 17 18:49:07.168883 env[1211]: time="2025-03-17T18:49:07.168812282Z" level=error msg="StopPodSandbox for \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\" failed" error="failed to destroy network for sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:49:07.169734 kubelet[1541]: E0317 18:49:07.169414 1541 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:07.169734 kubelet[1541]: E0317 18:49:07.169528 1541 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a"} Mar 17 18:49:07.169734 kubelet[1541]: E0317 18:49:07.169603 1541 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:49:07.169734 kubelet[1541]: E0317 18:49:07.169696 1541 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-cpg67" podUID="0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766" Mar 17 18:49:07.838144 kubelet[1541]: E0317 18:49:07.837962 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:08.839219 kubelet[1541]: E0317 18:49:08.839128 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:09.839413 kubelet[1541]: E0317 18:49:09.839315 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:10.840534 kubelet[1541]: E0317 18:49:10.840467 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:11.841122 kubelet[1541]: E0317 18:49:11.841068 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:12.811322 kubelet[1541]: E0317 18:49:12.811242 1541 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:12.842012 kubelet[1541]: E0317 18:49:12.841919 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:13.241939 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3707890398.mount: Deactivated successfully. Mar 17 18:49:13.292847 env[1211]: time="2025-03-17T18:49:13.292776787Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:13.296200 env[1211]: time="2025-03-17T18:49:13.296144805Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:13.298685 env[1211]: time="2025-03-17T18:49:13.298638848Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:13.300951 env[1211]: time="2025-03-17T18:49:13.300908582Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:13.301531 env[1211]: time="2025-03-17T18:49:13.301470215Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Mar 17 18:49:13.324141 env[1211]: time="2025-03-17T18:49:13.324069580Z" level=info msg="CreateContainer within sandbox \"f105b09a5fa89164979e7365cdf8c0507bda3e487028662266cb981449e9be46\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 18:49:13.349472 env[1211]: time="2025-03-17T18:49:13.349398514Z" level=info msg="CreateContainer within sandbox \"f105b09a5fa89164979e7365cdf8c0507bda3e487028662266cb981449e9be46\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"15edd68861742ffffa9b04ea0650c4d592f4a8482c2b3c25077a5edc51963164\"" Mar 17 18:49:13.350331 env[1211]: time="2025-03-17T18:49:13.350286795Z" level=info msg="StartContainer for \"15edd68861742ffffa9b04ea0650c4d592f4a8482c2b3c25077a5edc51963164\"" Mar 17 18:49:13.382460 systemd[1]: Started cri-containerd-15edd68861742ffffa9b04ea0650c4d592f4a8482c2b3c25077a5edc51963164.scope. Mar 17 18:49:13.440598 kernel: kauditd_printk_skb: 38 callbacks suppressed Mar 17 18:49:13.440790 kernel: audit: type=1400 audit(1742237353.412:564): avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.412000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.412000 audit[2110]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fcdfd6589f8 items=0 ppid=1608 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:13.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656464363838363137343266666666613962303465613036353063 Mar 17 18:49:13.502164 kernel: audit: type=1300 audit(1742237353.412:564): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fcdfd6589f8 items=0 ppid=1608 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:13.502317 kernel: audit: type=1327 audit(1742237353.412:564): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656464363838363137343266666666613962303465613036353063 Mar 17 18:49:13.503281 kernel: audit: type=1400 audit(1742237353.413:565): avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.413000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.543901 kernel: audit: type=1400 audit(1742237353.413:565): avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.544113 kernel: audit: type=1400 audit(1742237353.413:565): avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.413000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.413000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.586250 kernel: audit: type=1400 audit(1742237353.413:565): avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.413000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.608531 kernel: audit: type=1400 audit(1742237353.413:565): avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.413000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.413000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.413000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.651102 kernel: audit: type=1400 audit(1742237353.413:565): avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.651285 kernel: audit: type=1400 audit(1742237353.413:565): avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.413000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.413000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.413000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.413000 audit: BPF prog-id=84 op=LOAD Mar 17 18:49:13.413000 audit[2110]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022ec08 items=0 ppid=1608 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:13.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656464363838363137343266666666613962303465613036353063 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit: BPF prog-id=85 op=LOAD Mar 17 18:49:13.439000 audit[2110]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022ec58 items=0 ppid=1608 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:13.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656464363838363137343266666666613962303465613036353063 Mar 17 18:49:13.439000 audit: BPF prog-id=85 op=UNLOAD Mar 17 18:49:13.439000 audit: BPF prog-id=84 op=UNLOAD Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:13.439000 audit: BPF prog-id=86 op=LOAD Mar 17 18:49:13.439000 audit[2110]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022ece8 items=0 ppid=1608 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:13.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656464363838363137343266666666613962303465613036353063 Mar 17 18:49:13.653842 env[1211]: time="2025-03-17T18:49:13.653789692Z" level=info msg="StartContainer for \"15edd68861742ffffa9b04ea0650c4d592f4a8482c2b3c25077a5edc51963164\" returns successfully" Mar 17 18:49:13.737624 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Mar 17 18:49:13.737813 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Mar 17 18:49:13.842302 kubelet[1541]: E0317 18:49:13.842148 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:14.843150 kubelet[1541]: E0317 18:49:14.843072 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:15.068000 audit[2224]: AVC avc: denied { write } for pid=2224 comm="tee" name="fd" dev="proc" ino=19721 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:49:15.068000 audit[2224]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7dc749f7 a2=241 a3=1b6 items=1 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.068000 audit: CWD cwd="/etc/service/enabled/bird6/log" Mar 17 18:49:15.068000 audit: PATH item=0 name="/dev/fd/63" inode=19716 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:15.068000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:49:15.128000 audit[2243]: AVC avc: denied { write } for pid=2243 comm="tee" name="fd" dev="proc" ino=19731 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:49:15.134285 systemd[1]: run-containerd-runc-k8s.io-15edd68861742ffffa9b04ea0650c4d592f4a8482c2b3c25077a5edc51963164-runc.cvANxY.mount: Deactivated successfully. Mar 17 18:49:15.128000 audit[2243]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffea6e79e7 a2=241 a3=1b6 items=1 ppid=2202 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.128000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Mar 17 18:49:15.128000 audit: PATH item=0 name="/dev/fd/63" inode=19308 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:15.128000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:49:15.145000 audit[2241]: AVC avc: denied { write } for pid=2241 comm="tee" name="fd" dev="proc" ino=19353 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:49:15.145000 audit[2241]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd93e9c9f7 a2=241 a3=1b6 items=1 ppid=2198 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.145000 audit: CWD cwd="/etc/service/enabled/felix/log" Mar 17 18:49:15.145000 audit: PATH item=0 name="/dev/fd/63" inode=19307 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:15.145000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:49:15.148000 audit[2233]: AVC avc: denied { write } for pid=2233 comm="tee" name="fd" dev="proc" ino=19355 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:49:15.148000 audit[2233]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec344a9f7 a2=241 a3=1b6 items=1 ppid=2201 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.148000 audit: CWD cwd="/etc/service/enabled/confd/log" Mar 17 18:49:15.148000 audit: PATH item=0 name="/dev/fd/63" inode=19298 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:15.148000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:49:15.171000 audit[2267]: AVC avc: denied { write } for pid=2267 comm="tee" name="fd" dev="proc" ino=19747 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:49:15.171000 audit[2267]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd4dfc9f9 a2=241 a3=1b6 items=1 ppid=2215 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.171000 audit: CWD cwd="/etc/service/enabled/cni/log" Mar 17 18:49:15.171000 audit: PATH item=0 name="/dev/fd/63" inode=19739 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:15.171000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:49:15.181000 audit[2275]: AVC avc: denied { write } for pid=2275 comm="tee" name="fd" dev="proc" ino=19370 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:49:15.181000 audit[2275]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeee2b49f8 a2=241 a3=1b6 items=1 ppid=2212 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.185000 audit[2269]: AVC avc: denied { write } for pid=2269 comm="tee" name="fd" dev="proc" ino=19372 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:49:15.185000 audit[2269]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc07ca89e8 a2=241 a3=1b6 items=1 ppid=2205 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.185000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Mar 17 18:49:15.185000 audit: PATH item=0 name="/dev/fd/63" inode=19362 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:15.185000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:49:15.181000 audit: CWD cwd="/etc/service/enabled/bird/log" Mar 17 18:49:15.181000 audit: PATH item=0 name="/dev/fd/63" inode=19364 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:15.181000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:49:15.389000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.389000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.389000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.389000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.389000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.389000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.389000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.389000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.389000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.389000 audit: BPF prog-id=87 op=LOAD Mar 17 18:49:15.389000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd54edb5e0 a2=98 a3=3 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.389000 audit: BPF prog-id=87 op=UNLOAD Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit: BPF prog-id=88 op=LOAD Mar 17 18:49:15.390000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd54edb3c0 a2=74 a3=540051 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.390000 audit: BPF prog-id=88 op=UNLOAD Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.390000 audit: BPF prog-id=89 op=LOAD Mar 17 18:49:15.390000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd54edb3f0 a2=94 a3=2 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.390000 audit: BPF prog-id=89 op=UNLOAD Mar 17 18:49:15.568000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.568000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.568000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.568000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.568000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.568000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.568000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.568000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.568000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.568000 audit: BPF prog-id=90 op=LOAD Mar 17 18:49:15.568000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd54edb2b0 a2=40 a3=1 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.568000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.569000 audit: BPF prog-id=90 op=UNLOAD Mar 17 18:49:15.569000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.569000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd54edb380 a2=50 a3=7ffd54edb460 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.569000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd54edb2c0 a2=28 a3=0 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd54edb2f0 a2=28 a3=0 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd54edb200 a2=28 a3=0 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd54edb310 a2=28 a3=0 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd54edb2f0 a2=28 a3=0 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd54edb2e0 a2=28 a3=0 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd54edb310 a2=28 a3=0 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd54edb2f0 a2=28 a3=0 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd54edb310 a2=28 a3=0 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd54edb2e0 a2=28 a3=0 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd54edb350 a2=28 a3=0 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd54edb100 a2=50 a3=1 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.581000 audit: BPF prog-id=91 op=LOAD Mar 17 18:49:15.581000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd54edb100 a2=94 a3=5 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.582000 audit: BPF prog-id=91 op=UNLOAD Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd54edb1b0 a2=50 a3=1 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.582000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd54edb2d0 a2=4 a3=38 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.582000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { confidentiality } for pid=2306 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:15.582000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd54edb320 a2=94 a3=6 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.582000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { confidentiality } for pid=2306 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:15.582000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd54edaad0 a2=94 a3=83 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.582000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.582000 audit[2306]: AVC avc: denied { confidentiality } for pid=2306 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:15.582000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd54edaad0 a2=94 a3=83 items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.582000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit: BPF prog-id=92 op=LOAD Mar 17 18:49:15.595000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdb1cb870 a2=98 a3=1999999999999999 items=0 ppid=2200 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.595000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:49:15.595000 audit: BPF prog-id=92 op=UNLOAD Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit: BPF prog-id=93 op=LOAD Mar 17 18:49:15.595000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdb1cb750 a2=74 a3=ffff items=0 ppid=2200 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.595000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:49:15.595000 audit: BPF prog-id=93 op=UNLOAD Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.595000 audit: BPF prog-id=94 op=LOAD Mar 17 18:49:15.595000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdb1cb790 a2=40 a3=7ffcdb1cb970 items=0 ppid=2200 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.595000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:49:15.595000 audit: BPF prog-id=94 op=UNLOAD Mar 17 18:49:15.687428 systemd-networkd[1018]: vxlan.calico: Link UP Mar 17 18:49:15.687441 systemd-networkd[1018]: vxlan.calico: Gained carrier Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit: BPF prog-id=95 op=LOAD Mar 17 18:49:15.726000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd33809280 a2=98 a3=ffffffff items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.726000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.726000 audit: BPF prog-id=95 op=UNLOAD Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit: BPF prog-id=96 op=LOAD Mar 17 18:49:15.726000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd33809090 a2=74 a3=540051 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.726000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.726000 audit: BPF prog-id=96 op=UNLOAD Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.726000 audit: BPF prog-id=97 op=LOAD Mar 17 18:49:15.726000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd338090c0 a2=94 a3=2 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.726000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit: BPF prog-id=97 op=UNLOAD Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33808f90 a2=28 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd33808fc0 a2=28 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd33808ed0 a2=28 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33808fe0 a2=28 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33808fc0 a2=28 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33808fb0 a2=28 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33808fe0 a2=28 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd33808fc0 a2=28 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd33808fe0 a2=28 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd33808fb0 a2=28 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33809020 a2=28 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.727000 audit: BPF prog-id=98 op=LOAD Mar 17 18:49:15.727000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd33808e90 a2=40 a3=0 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.727000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.727000 audit: BPF prog-id=98 op=UNLOAD Mar 17 18:49:15.729000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.729000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd33808e80 a2=50 a3=2800 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.729000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd33808e80 a2=50 a3=2800 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.733000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit: BPF prog-id=99 op=LOAD Mar 17 18:49:15.733000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd338086a0 a2=94 a3=2 items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.733000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.733000 audit: BPF prog-id=99 op=UNLOAD Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.733000 audit: BPF prog-id=100 op=LOAD Mar 17 18:49:15.733000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd338087a0 a2=94 a3=2d items=0 ppid=2200 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.733000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:49:15.738000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.738000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.738000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.738000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.738000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.738000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.738000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.738000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.738000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.738000 audit: BPF prog-id=101 op=LOAD Mar 17 18:49:15.738000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff01946ad0 a2=98 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.738000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.738000 audit: BPF prog-id=101 op=UNLOAD Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit: BPF prog-id=102 op=LOAD Mar 17 18:49:15.739000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff019468b0 a2=74 a3=540051 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.739000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.739000 audit: BPF prog-id=102 op=UNLOAD Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.739000 audit: BPF prog-id=103 op=LOAD Mar 17 18:49:15.739000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff019468e0 a2=94 a3=2 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.739000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.739000 audit: BPF prog-id=103 op=UNLOAD Mar 17 18:49:15.843688 kubelet[1541]: E0317 18:49:15.843616 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:15.883000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.883000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.883000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.883000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.883000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.883000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.883000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.883000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.883000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.883000 audit: BPF prog-id=104 op=LOAD Mar 17 18:49:15.883000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff019467a0 a2=40 a3=1 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.883000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.883000 audit: BPF prog-id=104 op=UNLOAD Mar 17 18:49:15.883000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.883000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff01946870 a2=50 a3=7fff01946950 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.883000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.895000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.895000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff019467b0 a2=28 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.895000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff019467e0 a2=28 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff019466f0 a2=28 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff01946800 a2=28 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff019467e0 a2=28 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff019467d0 a2=28 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff01946800 a2=28 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff019467e0 a2=28 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff01946800 a2=28 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff019467d0 a2=28 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff01946840 a2=28 a3=0 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff019465f0 a2=50 a3=1 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit: BPF prog-id=105 op=LOAD Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff019465f0 a2=94 a3=5 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit: BPF prog-id=105 op=UNLOAD Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff019466a0 a2=50 a3=1 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff019467c0 a2=4 a3=38 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.896000 audit[2360]: AVC avc: denied { confidentiality } for pid=2360 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:15.896000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff01946810 a2=94 a3=6 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { confidentiality } for pid=2360 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:15.897000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff01945fc0 a2=94 a3=83 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.897000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { confidentiality } for pid=2360 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:15.897000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff01945fc0 a2=94 a3=83 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.897000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.897000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.897000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff01947a00 a2=10 a3=f1f00800 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.897000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.898000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.898000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff019478a0 a2=10 a3=3 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.898000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.898000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.898000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff01947840 a2=10 a3=3 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.898000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.898000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:15.898000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff01947840 a2=10 a3=7 items=0 ppid=2200 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.898000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:49:15.906000 audit: BPF prog-id=100 op=UNLOAD Mar 17 18:49:15.906000 audit[1149]: SYSCALL arch=c000003e syscall=257 success=yes exit=21 a0=ffffff9c a1=559731fe15b0 a2=800c2 a3=180 items=2 ppid=1 pid=1149 auid=4294967295 uid=245 gid=245 euid=245 suid=245 fsuid=245 egid=245 sgid=245 fsgid=245 tty=(none) ses=4294967295 comm="systemd-resolve" exe="/usr/lib/systemd/systemd-resolved" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:15.906000 audit: CWD cwd="/" Mar 17 18:49:15.906000 audit: PATH item=0 name="/run/systemd/resolve/" inode=85 dev=00:17 mode=040755 ouid=245 ogid=245 rdev=00:00 obj=system_u:object_r:systemd_resolved_runtime_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:15.906000 audit: PATH item=1 name="/run/systemd/resolve/.#stub-resolv.confezRQmK" inode=2151 dev=00:17 mode=0100600 ouid=245 ogid=245 rdev=00:00 obj=system_u:object_r:systemd_resolved_runtime_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:15.906000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-resolved" Mar 17 18:49:16.006000 audit[2386]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:49:16.006000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc440b4db0 a2=0 a3=7ffc440b4d9c items=0 ppid=2200 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:16.006000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:49:16.016000 audit[2385]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:49:16.016000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe5cf06690 a2=0 a3=7ffe5cf0667c items=0 ppid=2200 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:16.016000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:49:16.027000 audit[2388]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:49:16.027000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc5fc93a10 a2=0 a3=7ffc5fc939fc items=0 ppid=2200 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:16.027000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:49:16.032000 audit[2384]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:49:16.032000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd6cbecca0 a2=0 a3=7ffd6cbecc8c items=0 ppid=2200 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:16.032000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:49:16.844853 kubelet[1541]: E0317 18:49:16.844779 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:17.445812 systemd-networkd[1018]: vxlan.calico: Gained IPv6LL Mar 17 18:49:17.845894 kubelet[1541]: E0317 18:49:17.845715 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:18.031843 env[1211]: time="2025-03-17T18:49:18.031702349Z" level=info msg="StopPodSandbox for \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\"" Mar 17 18:49:18.095324 kubelet[1541]: I0317 18:49:18.095244 1541 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-tw8wz" podStartSLOduration=6.934465845 podStartE2EDuration="25.095214988s" podCreationTimestamp="2025-03-17 18:48:53 +0000 UTC" firstStartedPulling="2025-03-17 18:48:55.141919886 +0000 UTC m=+2.994341320" lastFinishedPulling="2025-03-17 18:49:13.302669036 +0000 UTC m=+21.155090463" observedRunningTime="2025-03-17 18:49:14.10852219 +0000 UTC m=+21.960943630" watchObservedRunningTime="2025-03-17 18:49:18.095214988 +0000 UTC m=+25.947636420" Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.093 [INFO][2414] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.093 [INFO][2414] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" iface="eth0" netns="/var/run/netns/cni-7e50e8d0-b496-d420-8b0e-c9264b213d54" Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.094 [INFO][2414] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" iface="eth0" netns="/var/run/netns/cni-7e50e8d0-b496-d420-8b0e-c9264b213d54" Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.095 [INFO][2414] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" iface="eth0" netns="/var/run/netns/cni-7e50e8d0-b496-d420-8b0e-c9264b213d54" Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.095 [INFO][2414] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.095 [INFO][2414] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.122 [INFO][2420] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" HandleID="k8s-pod-network.d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.122 [INFO][2420] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.122 [INFO][2420] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.133 [WARNING][2420] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" HandleID="k8s-pod-network.d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.133 [INFO][2420] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" HandleID="k8s-pod-network.d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.142 [INFO][2420] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:49:18.149580 env[1211]: 2025-03-17 18:49:18.145 [INFO][2414] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:18.149580 env[1211]: time="2025-03-17T18:49:18.146810402Z" level=info msg="TearDown network for sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\" successfully" Mar 17 18:49:18.149580 env[1211]: time="2025-03-17T18:49:18.146853202Z" level=info msg="StopPodSandbox for \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\" returns successfully" Mar 17 18:49:18.149580 env[1211]: time="2025-03-17T18:49:18.147988736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ztps5,Uid:0bab4b74-2669-4d4e-a238-ad0cfe65160a,Namespace:calico-system,Attempt:1,}" Mar 17 18:49:18.154913 systemd[1]: run-netns-cni\x2d7e50e8d0\x2db496\x2dd420\x2d8b0e\x2dc9264b213d54.mount: Deactivated successfully. Mar 17 18:49:18.333993 systemd-networkd[1018]: cali76552478701: Link UP Mar 17 18:49:18.350568 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:49:18.350981 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali76552478701: link becomes ready Mar 17 18:49:18.351382 systemd-networkd[1018]: cali76552478701: Gained carrier Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.230 [INFO][2427] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.90-k8s-csi--node--driver--ztps5-eth0 csi-node-driver- calico-system 0bab4b74-2669-4d4e-a238-ad0cfe65160a 1081 0 2025-03-17 18:48:53 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:84cddb44f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.128.0.90 csi-node-driver-ztps5 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali76552478701 [] []}} ContainerID="654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" Namespace="calico-system" Pod="csi-node-driver-ztps5" WorkloadEndpoint="10.128.0.90-k8s-csi--node--driver--ztps5-" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.230 [INFO][2427] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" Namespace="calico-system" Pod="csi-node-driver-ztps5" WorkloadEndpoint="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.270 [INFO][2438] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" HandleID="k8s-pod-network.654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.283 [INFO][2438] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" HandleID="k8s-pod-network.654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000100670), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.90", "pod":"csi-node-driver-ztps5", "timestamp":"2025-03-17 18:49:18.270688336 +0000 UTC"}, Hostname:"10.128.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.283 [INFO][2438] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.283 [INFO][2438] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.284 [INFO][2438] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.90' Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.286 [INFO][2438] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" host="10.128.0.90" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.292 [INFO][2438] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.90" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.298 [INFO][2438] ipam/ipam.go 489: Trying affinity for 192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.301 [INFO][2438] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.310 [INFO][2438] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.310 [INFO][2438] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.128/26 handle="k8s-pod-network.654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" host="10.128.0.90" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.313 [INFO][2438] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.320 [INFO][2438] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.128/26 handle="k8s-pod-network.654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" host="10.128.0.90" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.327 [INFO][2438] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.129/26] block=192.168.66.128/26 handle="k8s-pod-network.654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" host="10.128.0.90" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.327 [INFO][2438] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.129/26] handle="k8s-pod-network.654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" host="10.128.0.90" Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.327 [INFO][2438] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:49:18.374551 env[1211]: 2025-03-17 18:49:18.327 [INFO][2438] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.129/26] IPv6=[] ContainerID="654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" HandleID="k8s-pod-network.654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:18.375865 env[1211]: 2025-03-17 18:49:18.330 [INFO][2427] cni-plugin/k8s.go 386: Populated endpoint ContainerID="654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" Namespace="calico-system" Pod="csi-node-driver-ztps5" WorkloadEndpoint="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-csi--node--driver--ztps5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0bab4b74-2669-4d4e-a238-ad0cfe65160a", ResourceVersion:"1081", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 48, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"", Pod:"csi-node-driver-ztps5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali76552478701", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:18.375865 env[1211]: 2025-03-17 18:49:18.330 [INFO][2427] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.129/32] ContainerID="654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" Namespace="calico-system" Pod="csi-node-driver-ztps5" WorkloadEndpoint="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:18.375865 env[1211]: 2025-03-17 18:49:18.330 [INFO][2427] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali76552478701 ContainerID="654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" Namespace="calico-system" Pod="csi-node-driver-ztps5" WorkloadEndpoint="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:18.375865 env[1211]: 2025-03-17 18:49:18.352 [INFO][2427] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" Namespace="calico-system" Pod="csi-node-driver-ztps5" WorkloadEndpoint="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:18.375865 env[1211]: 2025-03-17 18:49:18.353 [INFO][2427] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" Namespace="calico-system" Pod="csi-node-driver-ztps5" WorkloadEndpoint="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-csi--node--driver--ztps5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0bab4b74-2669-4d4e-a238-ad0cfe65160a", ResourceVersion:"1081", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 48, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c", Pod:"csi-node-driver-ztps5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali76552478701", MAC:"a6:91:c6:c7:19:28", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:18.375865 env[1211]: 2025-03-17 18:49:18.366 [INFO][2427] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c" Namespace="calico-system" Pod="csi-node-driver-ztps5" WorkloadEndpoint="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:18.389000 audit[2458]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:49:18.389000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff98deed40 a2=0 a3=7fff98deed2c items=0 ppid=2200 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:18.389000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:49:18.397862 env[1211]: time="2025-03-17T18:49:18.397744480Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:49:18.397862 env[1211]: time="2025-03-17T18:49:18.397815562Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:49:18.398158 env[1211]: time="2025-03-17T18:49:18.397854729Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:49:18.398453 env[1211]: time="2025-03-17T18:49:18.398384600Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c pid=2466 runtime=io.containerd.runc.v2 Mar 17 18:49:18.427353 systemd[1]: Started cri-containerd-654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c.scope. Mar 17 18:49:18.477156 kernel: kauditd_printk_skb: 556 callbacks suppressed Mar 17 18:49:18.477371 kernel: audit: type=1400 audit(1742237358.447:673): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.520917 kernel: audit: type=1400 audit(1742237358.447:674): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.521134 kernel: audit: type=1400 audit(1742237358.447:675): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.543395 kernel: audit: type=1400 audit(1742237358.447:676): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.589091 kernel: audit: type=1400 audit(1742237358.447:677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.589251 kernel: audit: type=1400 audit(1742237358.447:678): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.619028 env[1211]: time="2025-03-17T18:49:18.615918001Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ztps5,Uid:0bab4b74-2669-4d4e-a238-ad0cfe65160a,Namespace:calico-system,Attempt:1,} returns sandbox id \"654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c\"" Mar 17 18:49:18.619028 env[1211]: time="2025-03-17T18:49:18.618276578Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Mar 17 18:49:18.633543 kernel: audit: type=1400 audit(1742237358.447:679): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.633729 kernel: audit: type=1400 audit(1742237358.447:680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.677273 kernel: audit: type=1400 audit(1742237358.447:681): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.677421 kernel: audit: type=1400 audit(1742237358.476:682): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.476000 audit: BPF prog-id=106 op=LOAD Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2466 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:18.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346364613861396536346162323632356562613163643935633934 Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2466 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:18.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346364613861396536346162323632356562613163643935633934 Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.477000 audit: BPF prog-id=107 op=LOAD Mar 17 18:49:18.477000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038e030 items=0 ppid=2466 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:18.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346364613861396536346162323632356562613163643935633934 Mar 17 18:49:18.498000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.498000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.498000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.498000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.498000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.498000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.498000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.498000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.498000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.498000 audit: BPF prog-id=108 op=LOAD Mar 17 18:49:18.498000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038e078 items=0 ppid=2466 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:18.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346364613861396536346162323632356562613163643935633934 Mar 17 18:49:18.520000 audit: BPF prog-id=108 op=UNLOAD Mar 17 18:49:18.520000 audit: BPF prog-id=107 op=UNLOAD Mar 17 18:49:18.521000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.521000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.521000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.521000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.521000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.521000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.521000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.521000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.521000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.521000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:18.521000 audit: BPF prog-id=109 op=LOAD Mar 17 18:49:18.521000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038e488 items=0 ppid=2466 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:18.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346364613861396536346162323632356562613163643935633934 Mar 17 18:49:18.845903 kubelet[1541]: E0317 18:49:18.845843 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:19.843789 env[1211]: time="2025-03-17T18:49:19.843720562Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:19.846335 kubelet[1541]: E0317 18:49:19.846266 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:19.847065 env[1211]: time="2025-03-17T18:49:19.847017613Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:19.849543 env[1211]: time="2025-03-17T18:49:19.849485778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:19.851909 env[1211]: time="2025-03-17T18:49:19.851869258Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:19.852475 env[1211]: time="2025-03-17T18:49:19.852425695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Mar 17 18:49:19.855754 env[1211]: time="2025-03-17T18:49:19.855713449Z" level=info msg="CreateContainer within sandbox \"654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Mar 17 18:49:19.884926 env[1211]: time="2025-03-17T18:49:19.884838789Z" level=info msg="CreateContainer within sandbox \"654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5067338dbef9bc43d235f819f31d20e35689bd341d2870fc2a0823d990a505bf\"" Mar 17 18:49:19.885966 env[1211]: time="2025-03-17T18:49:19.885926871Z" level=info msg="StartContainer for \"5067338dbef9bc43d235f819f31d20e35689bd341d2870fc2a0823d990a505bf\"" Mar 17 18:49:19.923834 systemd[1]: run-containerd-runc-k8s.io-5067338dbef9bc43d235f819f31d20e35689bd341d2870fc2a0823d990a505bf-runc.W7DO6P.mount: Deactivated successfully. Mar 17 18:49:19.931050 systemd[1]: Started cri-containerd-5067338dbef9bc43d235f819f31d20e35689bd341d2870fc2a0823d990a505bf.scope. Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f72003f2a88 items=0 ppid=2466 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:19.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363733333864626566396263343364323335663831396633316432 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit: BPF prog-id=110 op=LOAD Mar 17 18:49:19.956000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000292bf8 items=0 ppid=2466 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:19.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363733333864626566396263343364323335663831396633316432 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit: BPF prog-id=111 op=LOAD Mar 17 18:49:19.956000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000292c48 items=0 ppid=2466 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:19.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363733333864626566396263343364323335663831396633316432 Mar 17 18:49:19.956000 audit: BPF prog-id=111 op=UNLOAD Mar 17 18:49:19.956000 audit: BPF prog-id=110 op=UNLOAD Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:19.956000 audit: BPF prog-id=112 op=LOAD Mar 17 18:49:19.956000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000292cd8 items=0 ppid=2466 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:19.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363733333864626566396263343364323335663831396633316432 Mar 17 18:49:19.978965 env[1211]: time="2025-03-17T18:49:19.978784079Z" level=info msg="StartContainer for \"5067338dbef9bc43d235f819f31d20e35689bd341d2870fc2a0823d990a505bf\" returns successfully" Mar 17 18:49:19.981542 env[1211]: time="2025-03-17T18:49:19.981481068Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Mar 17 18:49:20.005944 systemd-networkd[1018]: cali76552478701: Gained IPv6LL Mar 17 18:49:20.847472 kubelet[1541]: E0317 18:49:20.847410 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:21.035956 env[1211]: time="2025-03-17T18:49:21.035792906Z" level=info msg="StopPodSandbox for \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\"" Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.139 [INFO][2557] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.139 [INFO][2557] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" iface="eth0" netns="/var/run/netns/cni-bc135c64-3df9-615e-ff4e-a73616cb1477" Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.139 [INFO][2557] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" iface="eth0" netns="/var/run/netns/cni-bc135c64-3df9-615e-ff4e-a73616cb1477" Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.140 [INFO][2557] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" iface="eth0" netns="/var/run/netns/cni-bc135c64-3df9-615e-ff4e-a73616cb1477" Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.140 [INFO][2557] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.140 [INFO][2557] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.184 [INFO][2564] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" HandleID="k8s-pod-network.e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.184 [INFO][2564] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.184 [INFO][2564] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.193 [WARNING][2564] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" HandleID="k8s-pod-network.e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.193 [INFO][2564] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" HandleID="k8s-pod-network.e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.195 [INFO][2564] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:49:21.199069 env[1211]: 2025-03-17 18:49:21.197 [INFO][2557] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:21.200187 env[1211]: time="2025-03-17T18:49:21.200140222Z" level=info msg="TearDown network for sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\" successfully" Mar 17 18:49:21.200343 env[1211]: time="2025-03-17T18:49:21.200314568Z" level=info msg="StopPodSandbox for \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\" returns successfully" Mar 17 18:49:21.201319 env[1211]: time="2025-03-17T18:49:21.201276964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-cpg67,Uid:0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766,Namespace:default,Attempt:1,}" Mar 17 18:49:21.205059 systemd[1]: run-netns-cni\x2dbc135c64\x2d3df9\x2d615e\x2dff4e\x2da73616cb1477.mount: Deactivated successfully. Mar 17 18:49:21.393063 env[1211]: time="2025-03-17T18:49:21.393006704Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:21.395550 env[1211]: time="2025-03-17T18:49:21.395466342Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:21.398379 env[1211]: time="2025-03-17T18:49:21.398308162Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:21.400908 env[1211]: time="2025-03-17T18:49:21.400846717Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:21.401811 env[1211]: time="2025-03-17T18:49:21.401746572Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Mar 17 18:49:21.405261 env[1211]: time="2025-03-17T18:49:21.405184957Z" level=info msg="CreateContainer within sandbox \"654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Mar 17 18:49:21.420115 systemd-networkd[1018]: cali037fea36e5e: Link UP Mar 17 18:49:21.434579 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:49:21.443683 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali037fea36e5e: link becomes ready Mar 17 18:49:21.436935 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount887552133.mount: Deactivated successfully. Mar 17 18:49:21.445136 systemd-networkd[1018]: cali037fea36e5e: Gained carrier Mar 17 18:49:21.453161 env[1211]: time="2025-03-17T18:49:21.451420664Z" level=info msg="CreateContainer within sandbox \"654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"7195c5a7637a878a193fce06ec5721376422095009fa5ae6a84a69a83b2eb6dc\"" Mar 17 18:49:21.453161 env[1211]: time="2025-03-17T18:49:21.452956811Z" level=info msg="StartContainer for \"7195c5a7637a878a193fce06ec5721376422095009fa5ae6a84a69a83b2eb6dc\"" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.300 [INFO][2570] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0 nginx-deployment-7fcdb87857- default 0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766 1095 0 2025-03-17 18:49:05 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.90 nginx-deployment-7fcdb87857-cpg67 eth0 default [] [] [kns.default ksa.default.default] cali037fea36e5e [] []}} ContainerID="273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" Namespace="default" Pod="nginx-deployment-7fcdb87857-cpg67" WorkloadEndpoint="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.300 [INFO][2570] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" Namespace="default" Pod="nginx-deployment-7fcdb87857-cpg67" WorkloadEndpoint="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.356 [INFO][2582] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" HandleID="k8s-pod-network.273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.370 [INFO][2582] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" HandleID="k8s-pod-network.273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e0b80), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.90", "pod":"nginx-deployment-7fcdb87857-cpg67", "timestamp":"2025-03-17 18:49:21.356685107 +0000 UTC"}, Hostname:"10.128.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.371 [INFO][2582] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.371 [INFO][2582] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.371 [INFO][2582] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.90' Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.374 [INFO][2582] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" host="10.128.0.90" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.378 [INFO][2582] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.90" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.384 [INFO][2582] ipam/ipam.go 489: Trying affinity for 192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.386 [INFO][2582] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.389 [INFO][2582] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.390 [INFO][2582] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.128/26 handle="k8s-pod-network.273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" host="10.128.0.90" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.391 [INFO][2582] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136 Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.397 [INFO][2582] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.128/26 handle="k8s-pod-network.273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" host="10.128.0.90" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.412 [INFO][2582] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.130/26] block=192.168.66.128/26 handle="k8s-pod-network.273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" host="10.128.0.90" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.413 [INFO][2582] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.130/26] handle="k8s-pod-network.273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" host="10.128.0.90" Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.413 [INFO][2582] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:49:21.476557 env[1211]: 2025-03-17 18:49:21.413 [INFO][2582] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.130/26] IPv6=[] ContainerID="273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" HandleID="k8s-pod-network.273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:21.477733 env[1211]: 2025-03-17 18:49:21.415 [INFO][2570] cni-plugin/k8s.go 386: Populated endpoint ContainerID="273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" Namespace="default" Pod="nginx-deployment-7fcdb87857-cpg67" WorkloadEndpoint="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766", ResourceVersion:"1095", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 49, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-cpg67", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali037fea36e5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:21.477733 env[1211]: 2025-03-17 18:49:21.415 [INFO][2570] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.130/32] ContainerID="273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" Namespace="default" Pod="nginx-deployment-7fcdb87857-cpg67" WorkloadEndpoint="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:21.477733 env[1211]: 2025-03-17 18:49:21.415 [INFO][2570] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali037fea36e5e ContainerID="273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" Namespace="default" Pod="nginx-deployment-7fcdb87857-cpg67" WorkloadEndpoint="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:21.477733 env[1211]: 2025-03-17 18:49:21.447 [INFO][2570] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" Namespace="default" Pod="nginx-deployment-7fcdb87857-cpg67" WorkloadEndpoint="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:21.477733 env[1211]: 2025-03-17 18:49:21.447 [INFO][2570] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" Namespace="default" Pod="nginx-deployment-7fcdb87857-cpg67" WorkloadEndpoint="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766", ResourceVersion:"1095", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 49, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136", Pod:"nginx-deployment-7fcdb87857-cpg67", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali037fea36e5e", MAC:"3e:9c:6d:52:26:5a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:21.477733 env[1211]: 2025-03-17 18:49:21.457 [INFO][2570] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136" Namespace="default" Pod="nginx-deployment-7fcdb87857-cpg67" WorkloadEndpoint="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:21.485000 audit[2606]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2606 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:49:21.485000 audit[2606]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fffad330860 a2=0 a3=7fffad33084c items=0 ppid=2200 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.485000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:49:21.508896 systemd[1]: Started cri-containerd-7195c5a7637a878a193fce06ec5721376422095009fa5ae6a84a69a83b2eb6dc.scope. Mar 17 18:49:21.530090 env[1211]: time="2025-03-17T18:49:21.529959342Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:49:21.530090 env[1211]: time="2025-03-17T18:49:21.530031946Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:49:21.530090 env[1211]: time="2025-03-17T18:49:21.530050572Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:49:21.533613 env[1211]: time="2025-03-17T18:49:21.530672827Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136 pid=2628 runtime=io.containerd.runc.v2 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f9d29f3f698 items=0 ppid=2466 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393563356137363337613837386131393366636530366563353732 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit: BPF prog-id=113 op=LOAD Mar 17 18:49:21.545000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000370058 items=0 ppid=2466 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393563356137363337613837386131393366636530366563353732 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit: BPF prog-id=114 op=LOAD Mar 17 18:49:21.545000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003700a8 items=0 ppid=2466 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393563356137363337613837386131393366636530366563353732 Mar 17 18:49:21.545000 audit: BPF prog-id=114 op=UNLOAD Mar 17 18:49:21.545000 audit: BPF prog-id=113 op=UNLOAD Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.545000 audit: BPF prog-id=115 op=LOAD Mar 17 18:49:21.545000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000370138 items=0 ppid=2466 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393563356137363337613837386131393366636530366563353732 Mar 17 18:49:21.560976 systemd[1]: Started cri-containerd-273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136.scope. Mar 17 18:49:21.578854 env[1211]: time="2025-03-17T18:49:21.578776246Z" level=info msg="StartContainer for \"7195c5a7637a878a193fce06ec5721376422095009fa5ae6a84a69a83b2eb6dc\" returns successfully" Mar 17 18:49:21.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit: BPF prog-id=116 op=LOAD Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2628 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237336662366435646232643234396334363133326330383263633538 Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2628 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237336662366435646232643234396334363133326330383263633538 Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.603000 audit: BPF prog-id=117 op=LOAD Mar 17 18:49:21.603000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028ee90 items=0 ppid=2628 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237336662366435646232643234396334363133326330383263633538 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit: BPF prog-id=118 op=LOAD Mar 17 18:49:21.604000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028eed8 items=0 ppid=2628 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237336662366435646232643234396334363133326330383263633538 Mar 17 18:49:21.604000 audit: BPF prog-id=118 op=UNLOAD Mar 17 18:49:21.604000 audit: BPF prog-id=117 op=UNLOAD Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:21.604000 audit: BPF prog-id=119 op=LOAD Mar 17 18:49:21.604000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028f2e8 items=0 ppid=2628 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237336662366435646232643234396334363133326330383263633538 Mar 17 18:49:21.644222 env[1211]: time="2025-03-17T18:49:21.644162734Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-cpg67,Uid:0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766,Namespace:default,Attempt:1,} returns sandbox id \"273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136\"" Mar 17 18:49:21.646478 env[1211]: time="2025-03-17T18:49:21.646411143Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 18:49:21.772088 update_engine[1200]: I0317 18:49:21.771193 1200 update_attempter.cc:509] Updating boot flags... Mar 17 18:49:21.849208 kubelet[1541]: E0317 18:49:21.849165 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:21.974163 kubelet[1541]: I0317 18:49:21.974116 1541 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Mar 17 18:49:21.974434 kubelet[1541]: I0317 18:49:21.974416 1541 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Mar 17 18:49:22.130570 kubelet[1541]: I0317 18:49:22.130208 1541 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-ztps5" podStartSLOduration=26.344536091 podStartE2EDuration="29.130191697s" podCreationTimestamp="2025-03-17 18:48:53 +0000 UTC" firstStartedPulling="2025-03-17 18:49:18.617490163 +0000 UTC m=+26.469911597" lastFinishedPulling="2025-03-17 18:49:21.403145767 +0000 UTC m=+29.255567203" observedRunningTime="2025-03-17 18:49:22.129959161 +0000 UTC m=+29.982380635" watchObservedRunningTime="2025-03-17 18:49:22.130191697 +0000 UTC m=+29.982613141" Mar 17 18:49:22.758666 systemd-networkd[1018]: cali037fea36e5e: Gained IPv6LL Mar 17 18:49:22.850398 kubelet[1541]: E0317 18:49:22.850308 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:23.850833 kubelet[1541]: E0317 18:49:23.850783 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:24.445140 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount681116682.mount: Deactivated successfully. Mar 17 18:49:24.852166 kubelet[1541]: E0317 18:49:24.851687 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:25.852620 kubelet[1541]: E0317 18:49:25.852543 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:26.291337 env[1211]: time="2025-03-17T18:49:26.291267708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:26.294482 env[1211]: time="2025-03-17T18:49:26.294428583Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:26.297288 env[1211]: time="2025-03-17T18:49:26.297237221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:26.300256 env[1211]: time="2025-03-17T18:49:26.300084944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:26.301155 env[1211]: time="2025-03-17T18:49:26.301099385Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee\"" Mar 17 18:49:26.304312 env[1211]: time="2025-03-17T18:49:26.304261980Z" level=info msg="CreateContainer within sandbox \"273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Mar 17 18:49:26.327293 env[1211]: time="2025-03-17T18:49:26.327151953Z" level=info msg="CreateContainer within sandbox \"273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"bc7038c0f8609643ff2eaccaddefea13f3eaf274f00a46ca9c37c38ce3a879aa\"" Mar 17 18:49:26.328271 env[1211]: time="2025-03-17T18:49:26.328080626Z" level=info msg="StartContainer for \"bc7038c0f8609643ff2eaccaddefea13f3eaf274f00a46ca9c37c38ce3a879aa\"" Mar 17 18:49:26.369745 systemd[1]: run-containerd-runc-k8s.io-bc7038c0f8609643ff2eaccaddefea13f3eaf274f00a46ca9c37c38ce3a879aa-runc.5EH7ZN.mount: Deactivated successfully. Mar 17 18:49:26.374332 systemd[1]: Started cri-containerd-bc7038c0f8609643ff2eaccaddefea13f3eaf274f00a46ca9c37c38ce3a879aa.scope. Mar 17 18:49:26.419466 kernel: kauditd_printk_skb: 193 callbacks suppressed Mar 17 18:49:26.419687 kernel: audit: type=1400 audit(1742237366.391:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.440671 kernel: audit: type=1400 audit(1742237366.391:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.482062 kernel: audit: type=1400 audit(1742237366.391:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.482288 kernel: audit: type=1400 audit(1742237366.391:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.526744 kernel: audit: type=1400 audit(1742237366.391:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.526910 kernel: audit: type=1400 audit(1742237366.391:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.526956 kernel: audit: type=1400 audit(1742237366.391:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.567029 kernel: audit: type=1400 audit(1742237366.391:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.567217 kernel: audit: type=1400 audit(1742237366.391:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.609803 kernel: audit: type=1400 audit(1742237366.439:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.439000 audit: BPF prog-id=120 op=LOAD Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2628 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:26.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373033386330663836303936343366663265616363616464656665 Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2628 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:26.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373033386330663836303936343366663265616363616464656665 Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.442000 audit: BPF prog-id=121 op=LOAD Mar 17 18:49:26.442000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021b5d0 items=0 ppid=2628 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:26.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373033386330663836303936343366663265616363616464656665 Mar 17 18:49:26.480000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.480000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.480000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.480000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.480000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.480000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.480000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.480000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.480000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.480000 audit: BPF prog-id=122 op=LOAD Mar 17 18:49:26.480000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021b618 items=0 ppid=2628 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:26.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373033386330663836303936343366663265616363616464656665 Mar 17 18:49:26.480000 audit: BPF prog-id=122 op=UNLOAD Mar 17 18:49:26.481000 audit: BPF prog-id=121 op=UNLOAD Mar 17 18:49:26.481000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.481000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.481000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.481000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.481000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.481000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.481000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.481000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.481000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.481000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:26.481000 audit: BPF prog-id=123 op=LOAD Mar 17 18:49:26.481000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021ba28 items=0 ppid=2628 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:26.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373033386330663836303936343366663265616363616464656665 Mar 17 18:49:26.631545 env[1211]: time="2025-03-17T18:49:26.631358862Z" level=info msg="StartContainer for \"bc7038c0f8609643ff2eaccaddefea13f3eaf274f00a46ca9c37c38ce3a879aa\" returns successfully" Mar 17 18:49:26.853524 kubelet[1541]: E0317 18:49:26.853314 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:27.160435 kubelet[1541]: I0317 18:49:27.160369 1541 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-cpg67" podStartSLOduration=17.503390546 podStartE2EDuration="22.160346216s" podCreationTimestamp="2025-03-17 18:49:05 +0000 UTC" firstStartedPulling="2025-03-17 18:49:21.645827174 +0000 UTC m=+29.498248598" lastFinishedPulling="2025-03-17 18:49:26.302782835 +0000 UTC m=+34.155204268" observedRunningTime="2025-03-17 18:49:27.160155334 +0000 UTC m=+35.012576780" watchObservedRunningTime="2025-03-17 18:49:27.160346216 +0000 UTC m=+35.012767637" Mar 17 18:49:27.853980 kubelet[1541]: E0317 18:49:27.853904 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:28.854669 kubelet[1541]: E0317 18:49:28.854597 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:29.855636 kubelet[1541]: E0317 18:49:29.855588 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:30.857539 kubelet[1541]: E0317 18:49:30.857458 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:31.250000 audit[2765]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:49:31.250000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff23e0a0a0 a2=0 a3=7fff23e0a08c items=0 ppid=1692 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:31.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:49:31.254000 audit[2765]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:49:31.254000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff23e0a0a0 a2=0 a3=0 items=0 ppid=1692 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:31.254000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:49:31.269000 audit[2769]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:49:31.269000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe6e815db0 a2=0 a3=7ffe6e815d9c items=0 ppid=1692 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:31.269000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:49:31.273000 audit[2769]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:49:31.273000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe6e815db0 a2=0 a3=0 items=0 ppid=1692 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:31.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:49:31.297772 kubelet[1541]: I0317 18:49:31.297174 1541 status_manager.go:890] "Failed to get status for pod" podUID="408ee9aa-0ff9-4ef8-90bb-3c6b98bd325d" pod="default/nfs-server-provisioner-0" err="pods \"nfs-server-provisioner-0\" is forbidden: User \"system:node:10.128.0.90\" cannot get resource \"pods\" in API group \"\" in the namespace \"default\": no relationship found between node '10.128.0.90' and this object" Mar 17 18:49:31.299125 systemd[1]: Created slice kubepods-besteffort-pod408ee9aa_0ff9_4ef8_90bb_3c6b98bd325d.slice. Mar 17 18:49:31.355773 kubelet[1541]: I0317 18:49:31.355723 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/408ee9aa-0ff9-4ef8-90bb-3c6b98bd325d-data\") pod \"nfs-server-provisioner-0\" (UID: \"408ee9aa-0ff9-4ef8-90bb-3c6b98bd325d\") " pod="default/nfs-server-provisioner-0" Mar 17 18:49:31.356111 kubelet[1541]: I0317 18:49:31.356080 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pwkw9\" (UniqueName: \"kubernetes.io/projected/408ee9aa-0ff9-4ef8-90bb-3c6b98bd325d-kube-api-access-pwkw9\") pod \"nfs-server-provisioner-0\" (UID: \"408ee9aa-0ff9-4ef8-90bb-3c6b98bd325d\") " pod="default/nfs-server-provisioner-0" Mar 17 18:49:31.604003 env[1211]: time="2025-03-17T18:49:31.603864225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:408ee9aa-0ff9-4ef8-90bb-3c6b98bd325d,Namespace:default,Attempt:0,}" Mar 17 18:49:31.783954 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:49:31.783735 systemd-networkd[1018]: cali60e51b789ff: Link UP Mar 17 18:49:31.793813 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Mar 17 18:49:31.793319 systemd-networkd[1018]: cali60e51b789ff: Gained carrier Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.683 [INFO][2773] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.90-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 408ee9aa-0ff9-4ef8-90bb-3c6b98bd325d 1146 0 2025-03-17 18:49:31 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.90 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.90-k8s-nfs--server--provisioner--0-" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.683 [INFO][2773] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.90-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.722 [INFO][2786] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" HandleID="k8s-pod-network.7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" Workload="10.128.0.90-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.737 [INFO][2786] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" HandleID="k8s-pod-network.7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" Workload="10.128.0.90-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318960), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.90", "pod":"nfs-server-provisioner-0", "timestamp":"2025-03-17 18:49:31.722871357 +0000 UTC"}, Hostname:"10.128.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.737 [INFO][2786] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.738 [INFO][2786] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.738 [INFO][2786] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.90' Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.740 [INFO][2786] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" host="10.128.0.90" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.745 [INFO][2786] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.90" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.750 [INFO][2786] ipam/ipam.go 489: Trying affinity for 192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.752 [INFO][2786] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.755 [INFO][2786] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.755 [INFO][2786] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.128/26 handle="k8s-pod-network.7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" host="10.128.0.90" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.757 [INFO][2786] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.763 [INFO][2786] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.128/26 handle="k8s-pod-network.7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" host="10.128.0.90" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.771 [INFO][2786] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.131/26] block=192.168.66.128/26 handle="k8s-pod-network.7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" host="10.128.0.90" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.772 [INFO][2786] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.131/26] handle="k8s-pod-network.7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" host="10.128.0.90" Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.772 [INFO][2786] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:49:31.818679 env[1211]: 2025-03-17 18:49:31.772 [INFO][2786] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.131/26] IPv6=[] ContainerID="7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" HandleID="k8s-pod-network.7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" Workload="10.128.0.90-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:49:31.820076 env[1211]: 2025-03-17 18:49:31.773 [INFO][2773] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.90-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"408ee9aa-0ff9-4ef8-90bb-3c6b98bd325d", ResourceVersion:"1146", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:31.820076 env[1211]: 2025-03-17 18:49:31.774 [INFO][2773] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.131/32] ContainerID="7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.90-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:49:31.820076 env[1211]: 2025-03-17 18:49:31.774 [INFO][2773] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.90-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:49:31.820076 env[1211]: 2025-03-17 18:49:31.795 [INFO][2773] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.90-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:49:31.820441 env[1211]: 2025-03-17 18:49:31.800 [INFO][2773] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.90-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"408ee9aa-0ff9-4ef8-90bb-3c6b98bd325d", ResourceVersion:"1146", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ee:ce:a3:72:d2:b0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:31.820441 env[1211]: 2025-03-17 18:49:31.817 [INFO][2773] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.90-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:49:31.856550 kernel: kauditd_printk_skb: 59 callbacks suppressed Mar 17 18:49:31.856749 kernel: audit: type=1325 audit(1742237371.843:744): table=filter:75 family=2 entries=38 op=nft_register_chain pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:49:31.843000 audit[2811]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:49:31.858512 kubelet[1541]: E0317 18:49:31.858419 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:31.868875 env[1211]: time="2025-03-17T18:49:31.858173218Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:49:31.868875 env[1211]: time="2025-03-17T18:49:31.858230400Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:49:31.868875 env[1211]: time="2025-03-17T18:49:31.858249301Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:49:31.868875 env[1211]: time="2025-03-17T18:49:31.859159411Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a pid=2814 runtime=io.containerd.runc.v2 Mar 17 18:49:31.908242 kernel: audit: type=1300 audit(1742237371.843:744): arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fffed3c96b0 a2=0 a3=7fffed3c969c items=0 ppid=2200 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:31.843000 audit[2811]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fffed3c96b0 a2=0 a3=7fffed3c969c items=0 ppid=2200 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:31.891569 systemd[1]: Started cri-containerd-7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a.scope. Mar 17 18:49:31.843000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:49:31.932538 kernel: audit: type=1327 audit(1742237371.843:744): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:49:31.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.977362 kernel: audit: type=1400 audit(1742237371.934:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.977580 kernel: audit: type=1400 audit(1742237371.934:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.998599 kernel: audit: type=1400 audit(1742237371.934:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:32.042148 kernel: audit: type=1400 audit(1742237371.934:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:32.042261 kernel: audit: type=1400 audit(1742237371.934:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:32.042322 kernel: audit: type=1400 audit(1742237371.934:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:32.063056 kernel: audit: type=1400 audit(1742237371.934:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.976000 audit: BPF prog-id=124 op=LOAD Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2814 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:31.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761386639633830303836656232306666383333626432376230376161 Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2814 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:31.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761386639633830303836656232306666383333626432376230376161 Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.986000 audit: BPF prog-id=125 op=LOAD Mar 17 18:49:31.986000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003194b0 items=0 ppid=2814 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:31.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761386639633830303836656232306666383333626432376230376161 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit: BPF prog-id=126 op=LOAD Mar 17 18:49:31.997000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003194f8 items=0 ppid=2814 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:31.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761386639633830303836656232306666383333626432376230376161 Mar 17 18:49:31.997000 audit: BPF prog-id=126 op=UNLOAD Mar 17 18:49:31.997000 audit: BPF prog-id=125 op=UNLOAD Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:31.997000 audit: BPF prog-id=127 op=LOAD Mar 17 18:49:31.997000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000319908 items=0 ppid=2814 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:31.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761386639633830303836656232306666383333626432376230376161 Mar 17 18:49:32.125890 env[1211]: time="2025-03-17T18:49:32.125738126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:408ee9aa-0ff9-4ef8-90bb-3c6b98bd325d,Namespace:default,Attempt:0,} returns sandbox id \"7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a\"" Mar 17 18:49:32.129573 env[1211]: time="2025-03-17T18:49:32.128437585Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Mar 17 18:49:32.473228 systemd[1]: run-containerd-runc-k8s.io-7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a-runc.rgB7MY.mount: Deactivated successfully. Mar 17 18:49:32.819234 kubelet[1541]: E0317 18:49:32.810944 1541 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:32.858892 kubelet[1541]: E0317 18:49:32.858805 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:33.509893 systemd-networkd[1018]: cali60e51b789ff: Gained IPv6LL Mar 17 18:49:33.859839 kubelet[1541]: E0317 18:49:33.859690 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:34.860374 kubelet[1541]: E0317 18:49:34.860322 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:34.932637 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3842449538.mount: Deactivated successfully. Mar 17 18:49:35.861525 kubelet[1541]: E0317 18:49:35.861445 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:36.861958 kubelet[1541]: E0317 18:49:36.861866 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:37.862838 kubelet[1541]: E0317 18:49:37.862775 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:38.717250 env[1211]: time="2025-03-17T18:49:38.717182010Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:38.721256 env[1211]: time="2025-03-17T18:49:38.721205428Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:38.723679 env[1211]: time="2025-03-17T18:49:38.723638762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:38.726014 env[1211]: time="2025-03-17T18:49:38.725975777Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:38.727020 env[1211]: time="2025-03-17T18:49:38.726966505Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Mar 17 18:49:38.730555 env[1211]: time="2025-03-17T18:49:38.730490017Z" level=info msg="CreateContainer within sandbox \"7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Mar 17 18:49:38.747832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3169232548.mount: Deactivated successfully. Mar 17 18:49:38.761611 env[1211]: time="2025-03-17T18:49:38.761534150Z" level=info msg="CreateContainer within sandbox \"7a8f9c80086eb20ff833bd27b07aa9c05a50f36f01f32f2c2fad4e5c1dadda0a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"f85ff88d8b78b66109bcd6db80e7496995f897334667edceee16eb87210e17c7\"" Mar 17 18:49:38.762902 env[1211]: time="2025-03-17T18:49:38.762846323Z" level=info msg="StartContainer for \"f85ff88d8b78b66109bcd6db80e7496995f897334667edceee16eb87210e17c7\"" Mar 17 18:49:38.795730 systemd[1]: Started cri-containerd-f85ff88d8b78b66109bcd6db80e7496995f897334667edceee16eb87210e17c7.scope. Mar 17 18:49:38.848438 kernel: kauditd_printk_skb: 50 callbacks suppressed Mar 17 18:49:38.848655 kernel: audit: type=1400 audit(1742237378.821:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.848713 kernel: audit: type=1400 audit(1742237378.821:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.869247 kubelet[1541]: E0317 18:49:38.869204 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:38.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889888 kernel: audit: type=1400 audit(1742237378.821:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.933210 kernel: audit: type=1400 audit(1742237378.821:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.933699 kernel: audit: type=1400 audit(1742237378.821:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.933747 kernel: audit: type=1400 audit(1742237378.821:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.976452 kernel: audit: type=1400 audit(1742237378.821:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.998741 kernel: audit: type=1400 audit(1742237378.821:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:39.003834 env[1211]: time="2025-03-17T18:49:39.003773753Z" level=info msg="StartContainer for \"f85ff88d8b78b66109bcd6db80e7496995f897334667edceee16eb87210e17c7\" returns successfully" Mar 17 18:49:38.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:39.040288 kernel: audit: type=1400 audit(1742237378.821:771): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:39.040466 kernel: audit: type=1400 audit(1742237378.868:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.868000 audit: BPF prog-id=128 op=LOAD Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2814 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:38.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356666383864386237386236363130396263643664623830653734 Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2814 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:38.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356666383864386237386236363130396263643664623830653734 Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.870000 audit: BPF prog-id=129 op=LOAD Mar 17 18:49:38.870000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b2d10 items=0 ppid=2814 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:38.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356666383864386237386236363130396263643664623830653734 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit: BPF prog-id=130 op=LOAD Mar 17 18:49:38.889000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b2d58 items=0 ppid=2814 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:38.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356666383864386237386236363130396263643664623830653734 Mar 17 18:49:38.889000 audit: BPF prog-id=130 op=UNLOAD Mar 17 18:49:38.889000 audit: BPF prog-id=129 op=UNLOAD Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:38.889000 audit: BPF prog-id=131 op=LOAD Mar 17 18:49:38.889000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b3168 items=0 ppid=2814 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:38.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356666383864386237386236363130396263643664623830653734 Mar 17 18:49:39.073000 audit[2895]: AVC avc: denied { search } for pid=2895 comm="rpcbind" name="crypto" dev="proc" ino=23558 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c49 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:49:39.073000 audit[2895]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f308e1ec0c0 a2=0 a3=0 items=0 ppid=2877 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c49 key=(null) Mar 17 18:49:39.073000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Mar 17 18:49:39.119000 audit[2900]: AVC avc: denied { search } for pid=2900 comm="dbus-daemon" name="crypto" dev="proc" ino=23558 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c49 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:49:39.119000 audit[2900]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fada72fd0c0 a2=0 a3=0 items=0 ppid=2877 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c49 key=(null) Mar 17 18:49:39.119000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 18:49:39.123000 audit[2901]: AVC avc: denied { watch } for pid=2901 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=20673 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c49 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c38,c49 tclass=dir permissive=0 Mar 17 18:49:39.123000 audit[2901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55e36f2ee6b0 a2=2c8 a3=7ffde843797c items=0 ppid=2877 pid=2901 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c49 key=(null) Mar 17 18:49:39.123000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 18:49:39.129000 audit[2902]: AVC avc: denied { read } for pid=2902 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22724 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c49 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Mar 17 18:49:39.129000 audit[2902]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f8f96a95320 a1=80000 a2=d a3=7fffff6653c0 items=0 ppid=2877 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c49 key=(null) Mar 17 18:49:39.129000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 18:49:39.130000 audit[2902]: AVC avc: denied { search } for pid=2902 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23558 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c49 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:49:39.130000 audit[2902]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f8f95fe90c0 a2=0 a3=0 items=0 ppid=2877 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c49 key=(null) Mar 17 18:49:39.130000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 18:49:39.188664 kubelet[1541]: I0317 18:49:39.188579 1541 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.587444021 podStartE2EDuration="8.188555445s" podCreationTimestamp="2025-03-17 18:49:31 +0000 UTC" firstStartedPulling="2025-03-17 18:49:32.127626889 +0000 UTC m=+39.980048321" lastFinishedPulling="2025-03-17 18:49:38.728738309 +0000 UTC m=+46.581159745" observedRunningTime="2025-03-17 18:49:39.188535807 +0000 UTC m=+47.040957250" watchObservedRunningTime="2025-03-17 18:49:39.188555445 +0000 UTC m=+47.040976889" Mar 17 18:49:39.208000 audit[2922]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:49:39.208000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd604fe860 a2=0 a3=7ffd604fe84c items=0 ppid=1692 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:39.208000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:49:39.214000 audit[2922]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:49:39.214000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd604fe860 a2=0 a3=7ffd604fe84c items=0 ppid=1692 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:39.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:49:39.869854 kubelet[1541]: E0317 18:49:39.869786 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:40.870720 kubelet[1541]: E0317 18:49:40.870650 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:41.871950 kubelet[1541]: E0317 18:49:41.871849 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:42.872913 kubelet[1541]: E0317 18:49:42.872823 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:43.873303 kubelet[1541]: E0317 18:49:43.873247 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:44.875446 kubelet[1541]: E0317 18:49:44.875375 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:45.875876 kubelet[1541]: E0317 18:49:45.875801 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:46.876284 kubelet[1541]: E0317 18:49:46.876211 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:47.877013 kubelet[1541]: E0317 18:49:47.876950 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:48.411109 systemd[1]: Created slice kubepods-besteffort-pod639bde96_b422_49ae_80fd_489b0f7daba9.slice. Mar 17 18:49:48.513472 kubelet[1541]: I0317 18:49:48.513415 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-cc0cf641-49bf-4770-a22c-e94eef2fa037\" (UniqueName: \"kubernetes.io/nfs/639bde96-b422-49ae-80fd-489b0f7daba9-pvc-cc0cf641-49bf-4770-a22c-e94eef2fa037\") pod \"test-pod-1\" (UID: \"639bde96-b422-49ae-80fd-489b0f7daba9\") " pod="default/test-pod-1" Mar 17 18:49:48.513712 kubelet[1541]: I0317 18:49:48.513485 1541 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wxn84\" (UniqueName: \"kubernetes.io/projected/639bde96-b422-49ae-80fd-489b0f7daba9-kube-api-access-wxn84\") pod \"test-pod-1\" (UID: \"639bde96-b422-49ae-80fd-489b0f7daba9\") " pod="default/test-pod-1" Mar 17 18:49:48.653532 kernel: Failed to create system directory netfs Mar 17 18:49:48.653706 kernel: kauditd_printk_skb: 68 callbacks suppressed Mar 17 18:49:48.653744 kernel: audit: type=1400 audit(1742237388.639:788): avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.653788 kernel: Failed to create system directory netfs Mar 17 18:49:48.639000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.681933 kernel: audit: type=1400 audit(1742237388.639:788): avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.682123 kernel: Failed to create system directory netfs Mar 17 18:49:48.639000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.710270 kernel: audit: type=1400 audit(1742237388.639:788): avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.710447 kernel: Failed to create system directory netfs Mar 17 18:49:48.639000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.761733 kernel: audit: type=1400 audit(1742237388.639:788): avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.639000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.639000 audit[2949]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c061fd05e0 a1=153bc a2=55c057e532b0 a3=5 items=0 ppid=50 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.806775 kernel: audit: type=1300 audit(1742237388.639:788): arch=c000003e syscall=175 success=yes exit=0 a0=55c061fd05e0 a1=153bc a2=55c057e532b0 a3=5 items=0 ppid=50 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.806968 kernel: audit: type=1327 audit(1742237388.639:788): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:49:48.639000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:49:48.807664 kernel: Failed to create system directory fscache Mar 17 18:49:48.836089 kernel: audit: type=1400 audit(1742237388.800:789): avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.836271 kernel: Failed to create system directory fscache Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.864256 kernel: audit: type=1400 audit(1742237388.800:789): avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.864429 kernel: Failed to create system directory fscache Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.893515 kernel: audit: type=1400 audit(1742237388.800:789): avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.893691 kernel: Failed to create system directory fscache Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.894043 kubelet[1541]: E0317 18:49:48.894007 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.922244 kernel: audit: type=1400 audit(1742237388.800:789): avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.922439 kernel: Failed to create system directory fscache Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.932895 kernel: Failed to create system directory fscache Mar 17 18:49:48.933076 kernel: Failed to create system directory fscache Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.938537 kernel: Failed to create system directory fscache Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.953951 kernel: Failed to create system directory fscache Mar 17 18:49:48.954039 kernel: Failed to create system directory fscache Mar 17 18:49:48.954102 kernel: Failed to create system directory fscache Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.964468 kernel: Failed to create system directory fscache Mar 17 18:49:48.964592 kernel: Failed to create system directory fscache Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.800000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:48.974943 kernel: Failed to create system directory fscache Mar 17 18:49:48.979816 kernel: FS-Cache: Loaded Mar 17 18:49:48.800000 audit[2949]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c0621e59c0 a1=4c0fc a2=55c057e532b0 a3=5 items=0 ppid=50 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.800000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.030800 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.030952 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.031001 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.041310 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.041445 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.051837 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.051950 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.062071 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.062176 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.072537 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.072635 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.082971 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.083117 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.093923 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.094054 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.104177 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.104310 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.109553 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.119820 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.119943 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.130117 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.130240 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.140458 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.140622 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.150805 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.150960 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.161150 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.161330 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.171554 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.171682 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.182268 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.182422 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.192924 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.193044 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.198286 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.208530 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.208613 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.218840 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.218974 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.229181 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.234529 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.239773 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.245017 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.245147 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.255354 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.255483 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.265637 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.265759 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.276214 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.276390 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.287443 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.287590 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.292533 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.302910 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.303054 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.313190 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.313314 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.323566 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.323692 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.333925 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.334068 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.344490 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.344635 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.355102 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.355241 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.365392 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.365532 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.375908 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.376033 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.386737 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.386847 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.396971 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.397067 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.407408 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.407575 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.417836 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.417955 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.428215 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.428331 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.438993 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.439131 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.449448 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.449673 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.459972 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.460095 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.470173 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.470274 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.480653 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.480797 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.491077 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.491242 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.496644 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.501858 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.507037 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.512263 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.517647 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.528045 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.528251 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.533574 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.543890 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.543996 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.554454 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.554585 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.564713 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.564825 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.575336 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.575480 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.585891 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.586016 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.596159 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.596334 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.606640 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.606791 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.617054 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.617186 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.627310 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.627459 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.637754 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.637909 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.642994 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.648329 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.653482 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.658663 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.669191 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.669319 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.006000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.679346 kernel: Failed to create system directory sunrpc Mar 17 18:49:49.698755 kernel: RPC: Registered named UNIX socket transport module. Mar 17 18:49:49.698928 kernel: RPC: Registered udp transport module. Mar 17 18:49:49.698989 kernel: RPC: Registered tcp transport module. Mar 17 18:49:49.703549 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 17 18:49:49.006000 audit[2949]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c062231ad0 a1=1a810c a2=55c057e532b0 a3=5 items=6 ppid=50 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:49.006000 audit: CWD cwd="/" Mar 17 18:49:49.006000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:49.006000 audit: PATH item=1 name=(null) inode=23002 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:49.006000 audit: PATH item=2 name=(null) inode=23002 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:49.006000 audit: PATH item=3 name=(null) inode=23003 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:49.006000 audit: PATH item=4 name=(null) inode=23002 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:49.006000 audit: PATH item=5 name=(null) inode=23004 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:49:49.006000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.771181 kernel: Failed to create system directory nfs Mar 17 18:49:49.771375 kernel: Failed to create system directory nfs Mar 17 18:49:49.771423 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.781098 kernel: Failed to create system directory nfs Mar 17 18:49:49.781252 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.790791 kernel: Failed to create system directory nfs Mar 17 18:49:49.790916 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.800705 kernel: Failed to create system directory nfs Mar 17 18:49:49.800839 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.810426 kernel: Failed to create system directory nfs Mar 17 18:49:49.810569 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.820187 kernel: Failed to create system directory nfs Mar 17 18:49:49.820296 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.830421 kernel: Failed to create system directory nfs Mar 17 18:49:49.830565 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.835541 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.845238 kernel: Failed to create system directory nfs Mar 17 18:49:49.845323 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.854989 kernel: Failed to create system directory nfs Mar 17 18:49:49.855108 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.864881 kernel: Failed to create system directory nfs Mar 17 18:49:49.864966 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.874612 kernel: Failed to create system directory nfs Mar 17 18:49:49.874749 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.879540 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.889224 kernel: Failed to create system directory nfs Mar 17 18:49:49.889360 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.894922 kubelet[1541]: E0317 18:49:49.894824 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:49.898975 kernel: Failed to create system directory nfs Mar 17 18:49:49.899094 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.908977 kernel: Failed to create system directory nfs Mar 17 18:49:49.909125 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.918732 kernel: Failed to create system directory nfs Mar 17 18:49:49.918950 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.928544 kernel: Failed to create system directory nfs Mar 17 18:49:49.928669 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.938226 kernel: Failed to create system directory nfs Mar 17 18:49:49.938325 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.948117 kernel: Failed to create system directory nfs Mar 17 18:49:49.948244 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.957940 kernel: Failed to create system directory nfs Mar 17 18:49:49.958036 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.967719 kernel: Failed to create system directory nfs Mar 17 18:49:49.967832 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.977806 kernel: Failed to create system directory nfs Mar 17 18:49:49.977918 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.987799 kernel: Failed to create system directory nfs Mar 17 18:49:49.987946 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.997695 kernel: Failed to create system directory nfs Mar 17 18:49:49.997807 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.007457 kernel: Failed to create system directory nfs Mar 17 18:49:50.007620 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.017397 kernel: Failed to create system directory nfs Mar 17 18:49:50.017564 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.022554 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.032452 kernel: Failed to create system directory nfs Mar 17 18:49:50.032637 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.037387 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.042309 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.047211 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.052253 kernel: Failed to create system directory nfs Mar 17 18:49:49.750000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.085343 kernel: FS-Cache: Netfs 'nfs' registered for caching Mar 17 18:49:49.750000 audit[2949]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c0624529b0 a1=16ea84 a2=55c057e532b0 a3=5 items=0 ppid=50 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:49.750000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.146290 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.146398 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.146461 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.156399 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.156572 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.166462 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.166640 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.176570 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.176726 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.181688 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.191778 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.191900 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.201902 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.202054 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.206711 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.211983 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.217204 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.222329 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.227358 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.232432 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.237466 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.242467 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.247669 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.252666 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.257689 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.262639 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.267788 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.277766 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.277911 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.282866 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.287866 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.292841 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.297816 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.303015 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.308244 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.313238 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.318203 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.323267 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.328375 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.333461 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.338452 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.343412 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.348529 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.353551 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.358666 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.363659 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.368678 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.373715 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.384094 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.384227 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.394103 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.394215 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.404096 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.404208 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.414076 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.414217 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.424233 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.424383 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.434389 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.434545 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.444389 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.444528 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.454268 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.454378 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.464192 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.464270 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.474245 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.474361 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.484346 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.484523 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.494912 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.495116 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.504842 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.504989 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.514951 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.515074 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.519904 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.525079 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.530071 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.540101 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.540213 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.545071 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.550456 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.555491 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.560564 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.565424 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.570433 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.575954 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.581170 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.586541 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.591665 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.601798 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.601910 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.121000 audit[2954]: AVC avc: denied { confidentiality } for pid=2954 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.611915 kernel: Failed to create system directory nfs4 Mar 17 18:49:50.765088 kernel: NFS: Registering the id_resolver key type Mar 17 18:49:50.765302 kernel: Key type id_resolver registered Mar 17 18:49:50.765344 kernel: Key type id_legacy registered Mar 17 18:49:50.121000 audit[2954]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f977428b010 a1=208d7c a2=56230661e2b0 a3=5 items=0 ppid=50 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:50.121000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.792731 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.792876 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.802959 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.803052 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.813519 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.813642 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.818734 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.823882 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.834436 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.834558 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.844832 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.844923 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.855086 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.855260 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.860375 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.865689 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.875999 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.876105 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.887406 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.887653 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.892726 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.895973 kubelet[1541]: E0317 18:49:50.895889 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.902998 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.903076 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.908128 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.919047 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.919146 kernel: Failed to create system directory rpcgss Mar 17 18:49:50.783000 audit[2955]: AVC avc: denied { confidentiality } for pid=2955 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:49:50.783000 audit[2955]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fee2c75b010 a1=70b4c a2=55c3ccdff2b0 a3=5 items=0 ppid=50 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:50.783000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Mar 17 18:49:50.963645 nfsidmap[2962]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Mar 17 18:49:50.973989 nfsidmap[2963]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Mar 17 18:49:50.989000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:49:50.989000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:49:50.989000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:49:50.990000 audit[1345]: AVC avc: denied { watch_reads } for pid=1345 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:49:50.990000 audit[1345]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ab6cf055e0 a2=10 a3=6abc04219cb4e861 items=0 ppid=1 pid=1345 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:50.990000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:49:50.990000 audit[1345]: AVC avc: denied { watch_reads } for pid=1345 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:49:50.990000 audit[1345]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ab6cf055e0 a2=10 a3=6abc04219cb4e861 items=0 ppid=1 pid=1345 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:50.990000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:49:50.990000 audit[1345]: AVC avc: denied { watch_reads } for pid=1345 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:49:50.990000 audit[1345]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ab6cf055e0 a2=10 a3=6abc04219cb4e861 items=0 ppid=1 pid=1345 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:50.990000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:49:51.116692 env[1211]: time="2025-03-17T18:49:51.116004954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:639bde96-b422-49ae-80fd-489b0f7daba9,Namespace:default,Attempt:0,}" Mar 17 18:49:51.302467 systemd-networkd[1018]: cali5ec59c6bf6e: Link UP Mar 17 18:49:51.317386 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:49:51.317670 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Mar 17 18:49:51.321127 systemd-networkd[1018]: cali5ec59c6bf6e: Gained carrier Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.184 [INFO][2965] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.90-k8s-test--pod--1-eth0 default 639bde96-b422-49ae-80fd-489b0f7daba9 1219 0 2025-03-17 18:49:32 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.90 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.90-k8s-test--pod--1-" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.184 [INFO][2965] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.90-k8s-test--pod--1-eth0" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.222 [INFO][2977] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" HandleID="k8s-pod-network.2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" Workload="10.128.0.90-k8s-test--pod--1-eth0" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.241 [INFO][2977] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" HandleID="k8s-pod-network.2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" Workload="10.128.0.90-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318960), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.90", "pod":"test-pod-1", "timestamp":"2025-03-17 18:49:51.222090048 +0000 UTC"}, Hostname:"10.128.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.241 [INFO][2977] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.241 [INFO][2977] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.241 [INFO][2977] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.90' Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.249 [INFO][2977] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" host="10.128.0.90" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.256 [INFO][2977] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.90" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.264 [INFO][2977] ipam/ipam.go 489: Trying affinity for 192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.275 [INFO][2977] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.279 [INFO][2977] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.128/26 host="10.128.0.90" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.279 [INFO][2977] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.128/26 handle="k8s-pod-network.2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" host="10.128.0.90" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.283 [INFO][2977] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216 Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.288 [INFO][2977] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.128/26 handle="k8s-pod-network.2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" host="10.128.0.90" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.296 [INFO][2977] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.132/26] block=192.168.66.128/26 handle="k8s-pod-network.2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" host="10.128.0.90" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.296 [INFO][2977] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.132/26] handle="k8s-pod-network.2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" host="10.128.0.90" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.296 [INFO][2977] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.296 [INFO][2977] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.132/26] IPv6=[] ContainerID="2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" HandleID="k8s-pod-network.2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" Workload="10.128.0.90-k8s-test--pod--1-eth0" Mar 17 18:49:51.337961 env[1211]: 2025-03-17 18:49:51.298 [INFO][2965] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.90-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"639bde96-b422-49ae-80fd-489b0f7daba9", ResourceVersion:"1219", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 49, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:51.339359 env[1211]: 2025-03-17 18:49:51.298 [INFO][2965] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.132/32] ContainerID="2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.90-k8s-test--pod--1-eth0" Mar 17 18:49:51.339359 env[1211]: 2025-03-17 18:49:51.298 [INFO][2965] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.90-k8s-test--pod--1-eth0" Mar 17 18:49:51.339359 env[1211]: 2025-03-17 18:49:51.318 [INFO][2965] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.90-k8s-test--pod--1-eth0" Mar 17 18:49:51.339359 env[1211]: 2025-03-17 18:49:51.320 [INFO][2965] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.90-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"639bde96-b422-49ae-80fd-489b0f7daba9", ResourceVersion:"1219", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 49, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"1a:04:dc:4e:31:9e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:51.339359 env[1211]: 2025-03-17 18:49:51.330 [INFO][2965] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.90-k8s-test--pod--1-eth0" Mar 17 18:49:51.355000 audit[3002]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:49:51.355000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7fff2cc1ad00 a2=0 a3=7fff2cc1acec items=0 ppid=2200 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:51.355000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:49:51.359521 env[1211]: time="2025-03-17T18:49:51.359306711Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:49:51.359521 env[1211]: time="2025-03-17T18:49:51.359365735Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:49:51.359521 env[1211]: time="2025-03-17T18:49:51.359384380Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:49:51.359991 env[1211]: time="2025-03-17T18:49:51.359667130Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216 pid=3004 runtime=io.containerd.runc.v2 Mar 17 18:49:51.388028 systemd[1]: Started cri-containerd-2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216.scope. Mar 17 18:49:51.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.408000 audit: BPF prog-id=132 op=LOAD Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3004 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:51.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261613931326631353966363932613866613330313762393061356138 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3004 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:51.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261613931326631353966363932613866613330313762393061356138 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit: BPF prog-id=133 op=LOAD Mar 17 18:49:51.409000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025d40 items=0 ppid=3004 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:51.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261613931326631353966363932613866613330313762393061356138 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit: BPF prog-id=134 op=LOAD Mar 17 18:49:51.409000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025d88 items=0 ppid=3004 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:51.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261613931326631353966363932613866613330313762393061356138 Mar 17 18:49:51.409000 audit: BPF prog-id=134 op=UNLOAD Mar 17 18:49:51.409000 audit: BPF prog-id=133 op=UNLOAD Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.409000 audit: BPF prog-id=135 op=LOAD Mar 17 18:49:51.409000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002f2198 items=0 ppid=3004 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:51.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261613931326631353966363932613866613330313762393061356138 Mar 17 18:49:51.450864 env[1211]: time="2025-03-17T18:49:51.450807783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:639bde96-b422-49ae-80fd-489b0f7daba9,Namespace:default,Attempt:0,} returns sandbox id \"2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216\"" Mar 17 18:49:51.453030 env[1211]: time="2025-03-17T18:49:51.452988331Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 18:49:51.716768 env[1211]: time="2025-03-17T18:49:51.716696306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:51.719924 env[1211]: time="2025-03-17T18:49:51.719873101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:51.722593 env[1211]: time="2025-03-17T18:49:51.722551930Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:51.725018 env[1211]: time="2025-03-17T18:49:51.724973590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:51.725983 env[1211]: time="2025-03-17T18:49:51.725931226Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee\"" Mar 17 18:49:51.729678 env[1211]: time="2025-03-17T18:49:51.729620106Z" level=info msg="CreateContainer within sandbox \"2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216\" for container &ContainerMetadata{Name:test,Attempt:0,}" Mar 17 18:49:51.748081 env[1211]: time="2025-03-17T18:49:51.748004414Z" level=info msg="CreateContainer within sandbox \"2aa912f159f692a8fa3017b90a5a8aed8840fb07aa994b3a3a9a83c36b98d216\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b3c73077ebca67ad0dac87312d580136402449b072829c1f3d0e77499c93ae27\"" Mar 17 18:49:51.748803 env[1211]: time="2025-03-17T18:49:51.748748440Z" level=info msg="StartContainer for \"b3c73077ebca67ad0dac87312d580136402449b072829c1f3d0e77499c93ae27\"" Mar 17 18:49:51.774234 systemd[1]: Started cri-containerd-b3c73077ebca67ad0dac87312d580136402449b072829c1f3d0e77499c93ae27.scope. Mar 17 18:49:51.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.794000 audit: BPF prog-id=136 op=LOAD Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3004 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:51.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233633733303737656263613637616430646163383733313264353830 Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3004 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:51.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233633733303737656263613637616430646163383733313264353830 Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.795000 audit: BPF prog-id=137 op=LOAD Mar 17 18:49:51.795000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dfd10 items=0 ppid=3004 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:51.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233633733303737656263613637616430646163383733313264353830 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit: BPF prog-id=138 op=LOAD Mar 17 18:49:51.796000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dfd58 items=0 ppid=3004 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:51.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233633733303737656263613637616430646163383733313264353830 Mar 17 18:49:51.796000 audit: BPF prog-id=138 op=UNLOAD Mar 17 18:49:51.796000 audit: BPF prog-id=137 op=UNLOAD Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:51.796000 audit: BPF prog-id=139 op=LOAD Mar 17 18:49:51.796000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d0168 items=0 ppid=3004 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:51.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233633733303737656263613637616430646163383733313264353830 Mar 17 18:49:51.817653 env[1211]: time="2025-03-17T18:49:51.817577755Z" level=info msg="StartContainer for \"b3c73077ebca67ad0dac87312d580136402449b072829c1f3d0e77499c93ae27\" returns successfully" Mar 17 18:49:51.896149 kubelet[1541]: E0317 18:49:51.896072 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:52.222327 kubelet[1541]: I0317 18:49:52.222253 1541 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=19.946761433 podStartE2EDuration="20.222227979s" podCreationTimestamp="2025-03-17 18:49:32 +0000 UTC" firstStartedPulling="2025-03-17 18:49:51.452244122 +0000 UTC m=+59.304665546" lastFinishedPulling="2025-03-17 18:49:51.72771066 +0000 UTC m=+59.580132092" observedRunningTime="2025-03-17 18:49:52.221875701 +0000 UTC m=+60.074297146" watchObservedRunningTime="2025-03-17 18:49:52.222227979 +0000 UTC m=+60.074649423" Mar 17 18:49:52.810637 kubelet[1541]: E0317 18:49:52.810566 1541 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:52.838182 systemd-networkd[1018]: cali5ec59c6bf6e: Gained IPv6LL Mar 17 18:49:52.864959 env[1211]: time="2025-03-17T18:49:52.864895442Z" level=info msg="StopPodSandbox for \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\"" Mar 17 18:49:52.896968 kubelet[1541]: E0317 18:49:52.896896 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.915 [WARNING][3108] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 49, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136", Pod:"nginx-deployment-7fcdb87857-cpg67", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali037fea36e5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.915 [INFO][3108] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.915 [INFO][3108] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" iface="eth0" netns="" Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.915 [INFO][3108] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.915 [INFO][3108] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.946 [INFO][3114] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" HandleID="k8s-pod-network.e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.946 [INFO][3114] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.946 [INFO][3114] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.954 [WARNING][3114] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" HandleID="k8s-pod-network.e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.954 [INFO][3114] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" HandleID="k8s-pod-network.e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.957 [INFO][3114] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:49:52.959972 env[1211]: 2025-03-17 18:49:52.958 [INFO][3108] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:52.961024 env[1211]: time="2025-03-17T18:49:52.960976855Z" level=info msg="TearDown network for sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\" successfully" Mar 17 18:49:52.961151 env[1211]: time="2025-03-17T18:49:52.961125431Z" level=info msg="StopPodSandbox for \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\" returns successfully" Mar 17 18:49:52.962013 env[1211]: time="2025-03-17T18:49:52.961978253Z" level=info msg="RemovePodSandbox for \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\"" Mar 17 18:49:52.962239 env[1211]: time="2025-03-17T18:49:52.962183822Z" level=info msg="Forcibly stopping sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\"" Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.012 [WARNING][3133] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"0cedc8dd-b3d5-4a8b-aa77-1ad04d4cc766", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 49, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"273fb6d5db2d249c46132c082cc587fe53cf0ee8542d3808b90f358faae32136", Pod:"nginx-deployment-7fcdb87857-cpg67", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali037fea36e5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.012 [INFO][3133] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.012 [INFO][3133] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" iface="eth0" netns="" Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.012 [INFO][3133] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.013 [INFO][3133] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.045 [INFO][3139] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" HandleID="k8s-pod-network.e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.045 [INFO][3139] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.045 [INFO][3139] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.053 [WARNING][3139] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" HandleID="k8s-pod-network.e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.053 [INFO][3139] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" HandleID="k8s-pod-network.e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Workload="10.128.0.90-k8s-nginx--deployment--7fcdb87857--cpg67-eth0" Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.056 [INFO][3139] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:49:53.058295 env[1211]: 2025-03-17 18:49:53.057 [INFO][3133] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a" Mar 17 18:49:53.059262 env[1211]: time="2025-03-17T18:49:53.058325904Z" level=info msg="TearDown network for sandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\" successfully" Mar 17 18:49:53.063170 env[1211]: time="2025-03-17T18:49:53.063038540Z" level=info msg="RemovePodSandbox \"e8bdc38eb6f3fe856a749de052fd0bff3c6908ac85897d4d6b35f45835c9c16a\" returns successfully" Mar 17 18:49:53.065282 env[1211]: time="2025-03-17T18:49:53.065235859Z" level=info msg="StopPodSandbox for \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\"" Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.115 [WARNING][3160] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-csi--node--driver--ztps5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0bab4b74-2669-4d4e-a238-ad0cfe65160a", ResourceVersion:"1107", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 48, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c", Pod:"csi-node-driver-ztps5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali76552478701", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.116 [INFO][3160] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.116 [INFO][3160] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" iface="eth0" netns="" Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.116 [INFO][3160] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.116 [INFO][3160] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.158 [INFO][3166] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" HandleID="k8s-pod-network.d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.158 [INFO][3166] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.161 [INFO][3166] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.176 [WARNING][3166] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" HandleID="k8s-pod-network.d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.176 [INFO][3166] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" HandleID="k8s-pod-network.d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.178 [INFO][3166] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:49:53.180600 env[1211]: 2025-03-17 18:49:53.179 [INFO][3160] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:53.181918 env[1211]: time="2025-03-17T18:49:53.181861022Z" level=info msg="TearDown network for sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\" successfully" Mar 17 18:49:53.182037 env[1211]: time="2025-03-17T18:49:53.181917120Z" level=info msg="StopPodSandbox for \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\" returns successfully" Mar 17 18:49:53.182593 env[1211]: time="2025-03-17T18:49:53.182542990Z" level=info msg="RemovePodSandbox for \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\"" Mar 17 18:49:53.182716 env[1211]: time="2025-03-17T18:49:53.182591687Z" level=info msg="Forcibly stopping sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\"" Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.243 [WARNING][3184] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.90-k8s-csi--node--driver--ztps5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0bab4b74-2669-4d4e-a238-ad0cfe65160a", ResourceVersion:"1107", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 48, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.90", ContainerID:"654cda8a9e64ab2625eba1cd95c94dad63c3027b7d89c880c9f27bad4301243c", Pod:"csi-node-driver-ztps5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali76552478701", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.244 [INFO][3184] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.244 [INFO][3184] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" iface="eth0" netns="" Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.244 [INFO][3184] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.244 [INFO][3184] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.271 [INFO][3190] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" HandleID="k8s-pod-network.d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.272 [INFO][3190] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.272 [INFO][3190] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.281 [WARNING][3190] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" HandleID="k8s-pod-network.d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.281 [INFO][3190] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" HandleID="k8s-pod-network.d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Workload="10.128.0.90-k8s-csi--node--driver--ztps5-eth0" Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.284 [INFO][3190] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:49:53.286592 env[1211]: 2025-03-17 18:49:53.285 [INFO][3184] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc" Mar 17 18:49:53.287533 env[1211]: time="2025-03-17T18:49:53.286651987Z" level=info msg="TearDown network for sandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\" successfully" Mar 17 18:49:53.290825 env[1211]: time="2025-03-17T18:49:53.290765904Z" level=info msg="RemovePodSandbox \"d2403005f728ad97b7a7620f3c68fb9c83f88fad8d78bec1cd5761389a1974fc\" returns successfully" Mar 17 18:49:53.897068 kubelet[1541]: E0317 18:49:53.897008 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:54.897452 kubelet[1541]: E0317 18:49:54.897379 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:55.897651 kubelet[1541]: E0317 18:49:55.897601 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:56.898437 kubelet[1541]: E0317 18:49:56.898370 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:57.898898 kubelet[1541]: E0317 18:49:57.898830 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:49:58.899975 kubelet[1541]: E0317 18:49:58.899904 1541 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"