Mar 17 19:39:31.998447 kernel: Linux version 5.15.179-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Mar 17 17:12:34 -00 2025 Mar 17 19:39:31.998497 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 19:39:31.998522 kernel: BIOS-provided physical RAM map: Mar 17 19:39:31.998547 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Mar 17 19:39:31.998564 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Mar 17 19:39:31.998580 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Mar 17 19:39:31.998599 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdcfff] usable Mar 17 19:39:31.998617 kernel: BIOS-e820: [mem 0x00000000bffdd000-0x00000000bfffffff] reserved Mar 17 19:39:31.998633 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Mar 17 19:39:31.998649 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Mar 17 19:39:31.998666 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable Mar 17 19:39:31.998682 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Mar 17 19:39:31.998702 kernel: NX (Execute Disable) protection: active Mar 17 19:39:31.998718 kernel: SMBIOS 3.0.0 present. Mar 17 19:39:31.998739 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Mar 17 19:39:31.998757 kernel: Hypervisor detected: KVM Mar 17 19:39:31.998774 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Mar 17 19:39:31.998792 kernel: kvm-clock: cpu 0, msr ba19a001, primary cpu clock Mar 17 19:39:31.998813 kernel: kvm-clock: using sched offset of 4962027627 cycles Mar 17 19:39:31.998832 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Mar 17 19:39:31.998851 kernel: tsc: Detected 1996.249 MHz processor Mar 17 19:39:31.998869 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 17 19:39:31.998888 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 17 19:39:31.998907 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 Mar 17 19:39:31.998926 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 17 19:39:31.998944 kernel: last_pfn = 0xbffdd max_arch_pfn = 0x400000000 Mar 17 19:39:31.998962 kernel: ACPI: Early table checksum verification disabled Mar 17 19:39:31.998985 kernel: ACPI: RSDP 0x00000000000F51E0 000014 (v00 BOCHS ) Mar 17 19:39:31.999003 kernel: ACPI: RSDT 0x00000000BFFE1B65 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 19:39:31.999021 kernel: ACPI: FACP 0x00000000BFFE1A49 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 19:39:31.999040 kernel: ACPI: DSDT 0x00000000BFFE0040 001A09 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 19:39:31.999057 kernel: ACPI: FACS 0x00000000BFFE0000 000040 Mar 17 19:39:32.001178 kernel: ACPI: APIC 0x00000000BFFE1ABD 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 19:39:32.001199 kernel: ACPI: WAET 0x00000000BFFE1B3D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 19:39:32.001214 kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1a49-0xbffe1abc] Mar 17 19:39:32.001235 kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe1a48] Mar 17 19:39:32.001249 kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] Mar 17 19:39:32.001263 kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1abd-0xbffe1b3c] Mar 17 19:39:32.001277 kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1b3d-0xbffe1b64] Mar 17 19:39:32.001291 kernel: No NUMA configuration found Mar 17 19:39:32.001311 kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] Mar 17 19:39:32.001326 kernel: NODE_DATA(0) allocated [mem 0x13fff7000-0x13fffcfff] Mar 17 19:39:32.001342 kernel: Zone ranges: Mar 17 19:39:32.001357 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 17 19:39:32.001372 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 17 19:39:32.001386 kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] Mar 17 19:39:32.001400 kernel: Movable zone start for each node Mar 17 19:39:32.001414 kernel: Early memory node ranges Mar 17 19:39:32.001429 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Mar 17 19:39:32.001443 kernel: node 0: [mem 0x0000000000100000-0x00000000bffdcfff] Mar 17 19:39:32.001460 kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] Mar 17 19:39:32.001475 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] Mar 17 19:39:32.001489 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 17 19:39:32.001503 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Mar 17 19:39:32.001518 kernel: On node 0, zone Normal: 35 pages in unavailable ranges Mar 17 19:39:32.001532 kernel: ACPI: PM-Timer IO Port: 0x608 Mar 17 19:39:32.001547 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Mar 17 19:39:32.001562 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Mar 17 19:39:32.001576 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 17 19:39:32.001595 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Mar 17 19:39:32.001610 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 17 19:39:32.001624 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Mar 17 19:39:32.001638 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Mar 17 19:39:32.001652 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 17 19:39:32.001667 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Mar 17 19:39:32.001681 kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Mar 17 19:39:32.001695 kernel: Booting paravirtualized kernel on KVM Mar 17 19:39:32.001710 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Mar 17 19:39:32.001728 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Mar 17 19:39:32.001743 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Mar 17 19:39:32.001757 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Mar 17 19:39:32.001771 kernel: pcpu-alloc: [0] 0 1 Mar 17 19:39:32.001785 kernel: kvm-guest: stealtime: cpu 0, msr 13bc1c0c0 Mar 17 19:39:32.001799 kernel: kvm-guest: PV spinlocks disabled, no host support Mar 17 19:39:32.001814 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031901 Mar 17 19:39:32.001828 kernel: Policy zone: Normal Mar 17 19:39:32.001845 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 19:39:32.001863 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Mar 17 19:39:32.001877 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Mar 17 19:39:32.001892 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 17 19:39:32.001906 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 17 19:39:32.001922 kernel: Memory: 3968276K/4193772K available (12294K kernel code, 2278K rwdata, 13724K rodata, 47472K init, 4108K bss, 225236K reserved, 0K cma-reserved) Mar 17 19:39:32.001936 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Mar 17 19:39:32.001951 kernel: ftrace: allocating 34580 entries in 136 pages Mar 17 19:39:32.001965 kernel: ftrace: allocated 136 pages with 2 groups Mar 17 19:39:32.001981 kernel: rcu: Hierarchical RCU implementation. Mar 17 19:39:32.001997 kernel: rcu: RCU event tracing is enabled. Mar 17 19:39:32.002012 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Mar 17 19:39:32.002026 kernel: Rude variant of Tasks RCU enabled. Mar 17 19:39:32.002041 kernel: Tracing variant of Tasks RCU enabled. Mar 17 19:39:32.002056 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 17 19:39:32.002093 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Mar 17 19:39:32.002108 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Mar 17 19:39:32.002122 kernel: Console: colour VGA+ 80x25 Mar 17 19:39:32.002140 kernel: printk: console [tty0] enabled Mar 17 19:39:32.002155 kernel: printk: console [ttyS0] enabled Mar 17 19:39:32.002169 kernel: ACPI: Core revision 20210730 Mar 17 19:39:32.002183 kernel: APIC: Switch to symmetric I/O mode setup Mar 17 19:39:32.002198 kernel: x2apic enabled Mar 17 19:39:32.002212 kernel: Switched APIC routing to physical x2apic. Mar 17 19:39:32.002227 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Mar 17 19:39:32.002241 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Mar 17 19:39:32.002256 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Mar 17 19:39:32.002275 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Mar 17 19:39:32.002289 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Mar 17 19:39:32.002304 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 17 19:39:32.002318 kernel: Spectre V2 : Mitigation: Retpolines Mar 17 19:39:32.002333 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 17 19:39:32.002347 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 17 19:39:32.002361 kernel: Speculative Store Bypass: Vulnerable Mar 17 19:39:32.002376 kernel: x86/fpu: x87 FPU will use FXSAVE Mar 17 19:39:32.002390 kernel: Freeing SMP alternatives memory: 32K Mar 17 19:39:32.002409 kernel: pid_max: default: 32768 minimum: 301 Mar 17 19:39:32.002423 kernel: LSM: Security Framework initializing Mar 17 19:39:32.002437 kernel: SELinux: Initializing. Mar 17 19:39:32.002452 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Mar 17 19:39:32.002466 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Mar 17 19:39:32.002482 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Mar 17 19:39:32.002505 kernel: Performance Events: AMD PMU driver. Mar 17 19:39:32.002523 kernel: ... version: 0 Mar 17 19:39:32.002537 kernel: ... bit width: 48 Mar 17 19:39:32.002552 kernel: ... generic registers: 4 Mar 17 19:39:32.002567 kernel: ... value mask: 0000ffffffffffff Mar 17 19:39:32.002582 kernel: ... max period: 00007fffffffffff Mar 17 19:39:32.002600 kernel: ... fixed-purpose events: 0 Mar 17 19:39:32.002615 kernel: ... event mask: 000000000000000f Mar 17 19:39:32.002630 kernel: signal: max sigframe size: 1440 Mar 17 19:39:32.002645 kernel: rcu: Hierarchical SRCU implementation. Mar 17 19:39:32.002660 kernel: smp: Bringing up secondary CPUs ... Mar 17 19:39:32.002677 kernel: x86: Booting SMP configuration: Mar 17 19:39:32.002694 kernel: .... node #0, CPUs: #1 Mar 17 19:39:32.002718 kernel: kvm-clock: cpu 1, msr ba19a041, secondary cpu clock Mar 17 19:39:32.002740 kernel: kvm-guest: stealtime: cpu 1, msr 13bd1c0c0 Mar 17 19:39:32.002759 kernel: smp: Brought up 1 node, 2 CPUs Mar 17 19:39:32.002774 kernel: smpboot: Max logical packages: 2 Mar 17 19:39:32.002789 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Mar 17 19:39:32.002804 kernel: devtmpfs: initialized Mar 17 19:39:32.002819 kernel: x86/mm: Memory block size: 128MB Mar 17 19:39:32.002838 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 17 19:39:32.002854 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Mar 17 19:39:32.002869 kernel: pinctrl core: initialized pinctrl subsystem Mar 17 19:39:32.002884 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 17 19:39:32.002899 kernel: audit: initializing netlink subsys (disabled) Mar 17 19:39:32.002914 kernel: audit: type=2000 audit(1742240371.107:1): state=initialized audit_enabled=0 res=1 Mar 17 19:39:32.002929 kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 17 19:39:32.002945 kernel: thermal_sys: Registered thermal governor 'user_space' Mar 17 19:39:32.002960 kernel: cpuidle: using governor menu Mar 17 19:39:32.002977 kernel: ACPI: bus type PCI registered Mar 17 19:39:32.002992 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 17 19:39:32.003007 kernel: dca service started, version 1.12.1 Mar 17 19:39:32.003023 kernel: PCI: Using configuration type 1 for base access Mar 17 19:39:32.003038 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 17 19:39:32.003053 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Mar 17 19:39:32.003090 kernel: ACPI: Added _OSI(Module Device) Mar 17 19:39:32.003106 kernel: ACPI: Added _OSI(Processor Device) Mar 17 19:39:32.003121 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 17 19:39:32.003139 kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 17 19:39:32.003154 kernel: ACPI: Added _OSI(Linux-Dell-Video) Mar 17 19:39:32.003169 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Mar 17 19:39:32.003184 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Mar 17 19:39:32.003199 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Mar 17 19:39:32.003214 kernel: ACPI: Interpreter enabled Mar 17 19:39:32.003229 kernel: ACPI: PM: (supports S0 S3 S5) Mar 17 19:39:32.003244 kernel: ACPI: Using IOAPIC for interrupt routing Mar 17 19:39:32.003260 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 17 19:39:32.003278 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Mar 17 19:39:32.003293 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Mar 17 19:39:32.003509 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Mar 17 19:39:32.003664 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Mar 17 19:39:32.003687 kernel: acpiphp: Slot [3] registered Mar 17 19:39:32.003703 kernel: acpiphp: Slot [4] registered Mar 17 19:39:32.003718 kernel: acpiphp: Slot [5] registered Mar 17 19:39:32.003732 kernel: acpiphp: Slot [6] registered Mar 17 19:39:32.003752 kernel: acpiphp: Slot [7] registered Mar 17 19:39:32.003767 kernel: acpiphp: Slot [8] registered Mar 17 19:39:32.003782 kernel: acpiphp: Slot [9] registered Mar 17 19:39:32.003797 kernel: acpiphp: Slot [10] registered Mar 17 19:39:32.003812 kernel: acpiphp: Slot [11] registered Mar 17 19:39:32.003827 kernel: acpiphp: Slot [12] registered Mar 17 19:39:32.003841 kernel: acpiphp: Slot [13] registered Mar 17 19:39:32.003856 kernel: acpiphp: Slot [14] registered Mar 17 19:39:32.003871 kernel: acpiphp: Slot [15] registered Mar 17 19:39:32.003889 kernel: acpiphp: Slot [16] registered Mar 17 19:39:32.003904 kernel: acpiphp: Slot [17] registered Mar 17 19:39:32.003918 kernel: acpiphp: Slot [18] registered Mar 17 19:39:32.003933 kernel: acpiphp: Slot [19] registered Mar 17 19:39:32.003948 kernel: acpiphp: Slot [20] registered Mar 17 19:39:32.003962 kernel: acpiphp: Slot [21] registered Mar 17 19:39:32.003977 kernel: acpiphp: Slot [22] registered Mar 17 19:39:32.003992 kernel: acpiphp: Slot [23] registered Mar 17 19:39:32.004007 kernel: acpiphp: Slot [24] registered Mar 17 19:39:32.004022 kernel: acpiphp: Slot [25] registered Mar 17 19:39:32.004039 kernel: acpiphp: Slot [26] registered Mar 17 19:39:32.004054 kernel: acpiphp: Slot [27] registered Mar 17 19:39:32.004093 kernel: acpiphp: Slot [28] registered Mar 17 19:39:32.004108 kernel: acpiphp: Slot [29] registered Mar 17 19:39:32.004142 kernel: acpiphp: Slot [30] registered Mar 17 19:39:32.004157 kernel: acpiphp: Slot [31] registered Mar 17 19:39:32.004172 kernel: PCI host bridge to bus 0000:00 Mar 17 19:39:32.004336 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 17 19:39:32.004481 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 17 19:39:32.004615 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Mar 17 19:39:32.004746 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Mar 17 19:39:32.004878 kernel: pci_bus 0000:00: root bus resource [mem 0xc000000000-0xc07fffffff window] Mar 17 19:39:32.005008 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Mar 17 19:39:32.008191 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Mar 17 19:39:32.008295 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Mar 17 19:39:32.008400 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Mar 17 19:39:32.008488 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Mar 17 19:39:32.008576 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Mar 17 19:39:32.008662 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Mar 17 19:39:32.008750 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Mar 17 19:39:32.008840 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Mar 17 19:39:32.008938 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Mar 17 19:39:32.009026 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Mar 17 19:39:32.009134 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Mar 17 19:39:32.009232 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Mar 17 19:39:32.009314 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Mar 17 19:39:32.009399 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc000000000-0xc000003fff 64bit pref] Mar 17 19:39:32.009482 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Mar 17 19:39:32.009567 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Mar 17 19:39:32.009649 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 17 19:39:32.009737 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Mar 17 19:39:32.009818 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Mar 17 19:39:32.009899 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Mar 17 19:39:32.009980 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xc000004000-0xc000007fff 64bit pref] Mar 17 19:39:32.012089 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Mar 17 19:39:32.012214 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Mar 17 19:39:32.012304 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Mar 17 19:39:32.012393 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Mar 17 19:39:32.012480 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xc000008000-0xc00000bfff 64bit pref] Mar 17 19:39:32.012573 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Mar 17 19:39:32.012663 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Mar 17 19:39:32.012748 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xc00000c000-0xc00000ffff 64bit pref] Mar 17 19:39:32.012861 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Mar 17 19:39:32.012951 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Mar 17 19:39:32.013040 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfeb93000-0xfeb93fff] Mar 17 19:39:32.014175 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xc000010000-0xc000013fff 64bit pref] Mar 17 19:39:32.014192 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Mar 17 19:39:32.014202 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 17 19:39:32.014211 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 17 19:39:32.014224 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 17 19:39:32.014233 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Mar 17 19:39:32.014242 kernel: iommu: Default domain type: Translated Mar 17 19:39:32.014251 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 17 19:39:32.014339 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Mar 17 19:39:32.014427 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 17 19:39:32.014514 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Mar 17 19:39:32.014527 kernel: vgaarb: loaded Mar 17 19:39:32.014536 kernel: pps_core: LinuxPPS API ver. 1 registered Mar 17 19:39:32.014548 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 17 19:39:32.014557 kernel: PTP clock support registered Mar 17 19:39:32.014566 kernel: PCI: Using ACPI for IRQ routing Mar 17 19:39:32.014576 kernel: PCI: pci_cache_line_size set to 64 bytes Mar 17 19:39:32.014584 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Mar 17 19:39:32.014593 kernel: e820: reserve RAM buffer [mem 0xbffdd000-0xbfffffff] Mar 17 19:39:32.014602 kernel: clocksource: Switched to clocksource kvm-clock Mar 17 19:39:32.014610 kernel: VFS: Disk quotas dquot_6.6.0 Mar 17 19:39:32.014619 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 17 19:39:32.014629 kernel: pnp: PnP ACPI init Mar 17 19:39:32.014717 kernel: pnp 00:03: [dma 2] Mar 17 19:39:32.014730 kernel: pnp: PnP ACPI: found 5 devices Mar 17 19:39:32.014740 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 17 19:39:32.014748 kernel: NET: Registered PF_INET protocol family Mar 17 19:39:32.014757 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Mar 17 19:39:32.014766 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Mar 17 19:39:32.014774 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 17 19:39:32.014786 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 17 19:39:32.014795 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Mar 17 19:39:32.014803 kernel: TCP: Hash tables configured (established 32768 bind 32768) Mar 17 19:39:32.014812 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Mar 17 19:39:32.014821 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Mar 17 19:39:32.014829 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 17 19:39:32.014838 kernel: NET: Registered PF_XDP protocol family Mar 17 19:39:32.014915 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 17 19:39:32.014991 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 17 19:39:32.015099 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Mar 17 19:39:32.015179 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Mar 17 19:39:32.015255 kernel: pci_bus 0000:00: resource 8 [mem 0xc000000000-0xc07fffffff window] Mar 17 19:39:32.015341 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Mar 17 19:39:32.015428 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Mar 17 19:39:32.015513 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Mar 17 19:39:32.015526 kernel: PCI: CLS 0 bytes, default 64 Mar 17 19:39:32.015536 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 17 19:39:32.015548 kernel: software IO TLB: mapped [mem 0x00000000bbfdd000-0x00000000bffdd000] (64MB) Mar 17 19:39:32.015556 kernel: Initialise system trusted keyrings Mar 17 19:39:32.015565 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Mar 17 19:39:32.015574 kernel: Key type asymmetric registered Mar 17 19:39:32.015582 kernel: Asymmetric key parser 'x509' registered Mar 17 19:39:32.015591 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Mar 17 19:39:32.015599 kernel: io scheduler mq-deadline registered Mar 17 19:39:32.015608 kernel: io scheduler kyber registered Mar 17 19:39:32.015616 kernel: io scheduler bfq registered Mar 17 19:39:32.015626 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Mar 17 19:39:32.015636 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Mar 17 19:39:32.015644 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Mar 17 19:39:32.015653 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Mar 17 19:39:32.015662 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Mar 17 19:39:32.015670 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 17 19:39:32.015679 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Mar 17 19:39:32.015688 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Mar 17 19:39:32.015696 kernel: random: crng init done Mar 17 19:39:32.015706 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 17 19:39:32.015714 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 17 19:39:32.015723 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Mar 17 19:39:32.015808 kernel: rtc_cmos 00:04: RTC can wake from S4 Mar 17 19:39:32.015889 kernel: rtc_cmos 00:04: registered as rtc0 Mar 17 19:39:32.015967 kernel: rtc_cmos 00:04: setting system clock to 2025-03-17T19:39:31 UTC (1742240371) Mar 17 19:39:32.016043 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Mar 17 19:39:32.016056 kernel: NET: Registered PF_INET6 protocol family Mar 17 19:39:32.016083 kernel: Segment Routing with IPv6 Mar 17 19:39:32.016092 kernel: In-situ OAM (IOAM) with IPv6 Mar 17 19:39:32.016101 kernel: NET: Registered PF_PACKET protocol family Mar 17 19:39:32.016110 kernel: Key type dns_resolver registered Mar 17 19:39:32.016180 kernel: IPI shorthand broadcast: enabled Mar 17 19:39:32.016189 kernel: sched_clock: Marking stable (841574122, 173143347)->(1094369881, -79652412) Mar 17 19:39:32.016198 kernel: registered taskstats version 1 Mar 17 19:39:32.016206 kernel: Loading compiled-in X.509 certificates Mar 17 19:39:32.016215 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.179-flatcar: d5b956bbabb2d386c0246a969032c0de9eaa8220' Mar 17 19:39:32.016226 kernel: Key type .fscrypt registered Mar 17 19:39:32.016234 kernel: Key type fscrypt-provisioning registered Mar 17 19:39:32.016243 kernel: ima: No TPM chip found, activating TPM-bypass! Mar 17 19:39:32.016251 kernel: ima: Allocated hash algorithm: sha1 Mar 17 19:39:32.016260 kernel: ima: No architecture policies found Mar 17 19:39:32.016268 kernel: clk: Disabling unused clocks Mar 17 19:39:32.016276 kernel: Freeing unused kernel image (initmem) memory: 47472K Mar 17 19:39:32.016286 kernel: Write protecting the kernel read-only data: 28672k Mar 17 19:39:32.016295 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Mar 17 19:39:32.016305 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Mar 17 19:39:32.016314 kernel: Run /init as init process Mar 17 19:39:32.016322 kernel: with arguments: Mar 17 19:39:32.016330 kernel: /init Mar 17 19:39:32.016339 kernel: with environment: Mar 17 19:39:32.016347 kernel: HOME=/ Mar 17 19:39:32.016355 kernel: TERM=linux Mar 17 19:39:32.016363 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Mar 17 19:39:32.016376 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 19:39:32.016389 systemd[1]: Detected virtualization kvm. Mar 17 19:39:32.016399 systemd[1]: Detected architecture x86-64. Mar 17 19:39:32.016408 systemd[1]: Running in initrd. Mar 17 19:39:32.016417 systemd[1]: No hostname configured, using default hostname. Mar 17 19:39:32.016427 systemd[1]: Hostname set to . Mar 17 19:39:32.016437 systemd[1]: Initializing machine ID from VM UUID. Mar 17 19:39:32.016447 systemd[1]: Queued start job for default target initrd.target. Mar 17 19:39:32.016457 systemd[1]: Started systemd-ask-password-console.path. Mar 17 19:39:32.016466 systemd[1]: Reached target cryptsetup.target. Mar 17 19:39:32.016476 systemd[1]: Reached target paths.target. Mar 17 19:39:32.016485 systemd[1]: Reached target slices.target. Mar 17 19:39:32.016494 systemd[1]: Reached target swap.target. Mar 17 19:39:32.016503 systemd[1]: Reached target timers.target. Mar 17 19:39:32.016512 systemd[1]: Listening on iscsid.socket. Mar 17 19:39:32.016524 systemd[1]: Listening on iscsiuio.socket. Mar 17 19:39:32.016542 systemd[1]: Listening on systemd-journald-audit.socket. Mar 17 19:39:32.016553 systemd[1]: Listening on systemd-journald-dev-log.socket. Mar 17 19:39:32.016562 systemd[1]: Listening on systemd-journald.socket. Mar 17 19:39:32.016572 systemd[1]: Listening on systemd-networkd.socket. Mar 17 19:39:32.016582 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 19:39:32.016594 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 19:39:32.016603 systemd[1]: Reached target sockets.target. Mar 17 19:39:32.016613 systemd[1]: Starting kmod-static-nodes.service... Mar 17 19:39:32.016623 systemd[1]: Finished network-cleanup.service. Mar 17 19:39:32.016632 systemd[1]: Starting systemd-fsck-usr.service... Mar 17 19:39:32.016642 systemd[1]: Starting systemd-journald.service... Mar 17 19:39:32.016651 systemd[1]: Starting systemd-modules-load.service... Mar 17 19:39:32.016661 systemd[1]: Starting systemd-resolved.service... Mar 17 19:39:32.016671 systemd[1]: Starting systemd-vconsole-setup.service... Mar 17 19:39:32.016682 systemd[1]: Finished kmod-static-nodes.service. Mar 17 19:39:32.016692 systemd[1]: Finished systemd-fsck-usr.service. Mar 17 19:39:32.016704 systemd-journald[185]: Journal started Mar 17 19:39:32.016751 systemd-journald[185]: Runtime Journal (/run/log/journal/1eda2386a93c425eb906d81a61f5cd63) is 8.0M, max 78.4M, 70.4M free. Mar 17 19:39:31.975123 systemd-modules-load[186]: Inserted module 'overlay' Mar 17 19:39:32.042564 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 17 19:39:32.026401 systemd-resolved[187]: Positive Trust Anchors: Mar 17 19:39:32.050440 systemd[1]: Started systemd-journald.service. Mar 17 19:39:32.050458 kernel: audit: type=1130 audit(1742240372.042:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.050471 kernel: Bridge firewalling registered Mar 17 19:39:32.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.026409 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 19:39:32.060998 kernel: audit: type=1130 audit(1742240372.050:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.061026 kernel: audit: type=1130 audit(1742240372.056:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.026445 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 19:39:32.068249 kernel: audit: type=1130 audit(1742240372.061:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.028955 systemd-resolved[187]: Defaulting to hostname 'linux'. Mar 17 19:39:32.050640 systemd-modules-load[186]: Inserted module 'br_netfilter' Mar 17 19:39:32.051053 systemd[1]: Started systemd-resolved.service. Mar 17 19:39:32.056773 systemd[1]: Finished systemd-vconsole-setup.service. Mar 17 19:39:32.061586 systemd[1]: Reached target nss-lookup.target. Mar 17 19:39:32.069387 systemd[1]: Starting dracut-cmdline-ask.service... Mar 17 19:39:32.070492 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 19:39:32.084868 kernel: audit: type=1130 audit(1742240372.079:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.078271 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 19:39:32.087616 kernel: SCSI subsystem initialized Mar 17 19:39:32.091498 systemd[1]: Finished dracut-cmdline-ask.service. Mar 17 19:39:32.097368 kernel: audit: type=1130 audit(1742240372.091:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.098226 systemd[1]: Starting dracut-cmdline.service... Mar 17 19:39:32.107786 dracut-cmdline[203]: dracut-dracut-053 Mar 17 19:39:32.112427 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 17 19:39:32.112448 kernel: device-mapper: uevent: version 1.0.3 Mar 17 19:39:32.112461 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 19:39:32.116634 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Mar 17 19:39:32.117585 systemd-modules-load[186]: Inserted module 'dm_multipath' Mar 17 19:39:32.125403 kernel: audit: type=1130 audit(1742240372.118:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.118386 systemd[1]: Finished systemd-modules-load.service. Mar 17 19:39:32.119714 systemd[1]: Starting systemd-sysctl.service... Mar 17 19:39:32.131965 systemd[1]: Finished systemd-sysctl.service. Mar 17 19:39:32.137861 kernel: audit: type=1130 audit(1742240372.132:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.180094 kernel: Loading iSCSI transport class v2.0-870. Mar 17 19:39:32.200150 kernel: iscsi: registered transport (tcp) Mar 17 19:39:32.226153 kernel: iscsi: registered transport (qla4xxx) Mar 17 19:39:32.226249 kernel: QLogic iSCSI HBA Driver Mar 17 19:39:32.284677 systemd[1]: Finished dracut-cmdline.service. Mar 17 19:39:32.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.287583 systemd[1]: Starting dracut-pre-udev.service... Mar 17 19:39:32.292675 kernel: audit: type=1130 audit(1742240372.285:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.376179 kernel: raid6: sse2x4 gen() 6253 MB/s Mar 17 19:39:32.394300 kernel: raid6: sse2x4 xor() 4966 MB/s Mar 17 19:39:32.412258 kernel: raid6: sse2x2 gen() 13451 MB/s Mar 17 19:39:32.430165 kernel: raid6: sse2x2 xor() 8124 MB/s Mar 17 19:39:32.451164 kernel: raid6: sse2x1 gen() 10441 MB/s Mar 17 19:39:32.469643 kernel: raid6: sse2x1 xor() 6589 MB/s Mar 17 19:39:32.469701 kernel: raid6: using algorithm sse2x2 gen() 13451 MB/s Mar 17 19:39:32.469729 kernel: raid6: .... xor() 8124 MB/s, rmw enabled Mar 17 19:39:32.470851 kernel: raid6: using ssse3x2 recovery algorithm Mar 17 19:39:32.493138 kernel: xor: measuring software checksum speed Mar 17 19:39:32.493207 kernel: prefetch64-sse : 18102 MB/sec Mar 17 19:39:32.493234 kernel: generic_sse : 14576 MB/sec Mar 17 19:39:32.495868 kernel: xor: using function: prefetch64-sse (18102 MB/sec) Mar 17 19:39:32.621463 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Mar 17 19:39:32.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.636470 systemd[1]: Finished dracut-pre-udev.service. Mar 17 19:39:32.638000 audit: BPF prog-id=7 op=LOAD Mar 17 19:39:32.638000 audit: BPF prog-id=8 op=LOAD Mar 17 19:39:32.639832 systemd[1]: Starting systemd-udevd.service... Mar 17 19:39:32.655997 systemd-udevd[385]: Using default interface naming scheme 'v252'. Mar 17 19:39:32.662202 systemd[1]: Started systemd-udevd.service. Mar 17 19:39:32.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.670024 systemd[1]: Starting dracut-pre-trigger.service... Mar 17 19:39:32.695929 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Mar 17 19:39:32.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.742482 systemd[1]: Finished dracut-pre-trigger.service. Mar 17 19:39:32.743969 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 19:39:32.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:32.787580 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 19:39:32.862461 kernel: virtio_blk virtio2: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) Mar 17 19:39:32.894720 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 17 19:39:32.894751 kernel: GPT:17805311 != 20971519 Mar 17 19:39:32.894769 kernel: GPT:Alternate GPT header not at the end of the disk. Mar 17 19:39:32.894787 kernel: GPT:17805311 != 20971519 Mar 17 19:39:32.894811 kernel: GPT: Use GNU Parted to correct GPT errors. Mar 17 19:39:32.894828 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 19:39:32.907090 kernel: libata version 3.00 loaded. Mar 17 19:39:32.920331 kernel: ata_piix 0000:00:01.1: version 2.13 Mar 17 19:39:32.939715 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (442) Mar 17 19:39:32.939734 kernel: scsi host0: ata_piix Mar 17 19:39:32.939853 kernel: scsi host1: ata_piix Mar 17 19:39:32.939952 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Mar 17 19:39:32.939965 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Mar 17 19:39:32.930510 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Mar 17 19:39:32.978997 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Mar 17 19:39:32.983774 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Mar 17 19:39:32.987858 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Mar 17 19:39:32.991908 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 19:39:32.993208 systemd[1]: Starting disk-uuid.service... Mar 17 19:39:33.004656 disk-uuid[471]: Primary Header is updated. Mar 17 19:39:33.004656 disk-uuid[471]: Secondary Entries is updated. Mar 17 19:39:33.004656 disk-uuid[471]: Secondary Header is updated. Mar 17 19:39:33.014101 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 19:39:33.019091 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 19:39:34.034129 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 19:39:34.036774 disk-uuid[472]: The operation has completed successfully. Mar 17 19:39:34.114439 systemd[1]: disk-uuid.service: Deactivated successfully. Mar 17 19:39:34.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:34.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:34.114623 systemd[1]: Finished disk-uuid.service. Mar 17 19:39:34.120012 systemd[1]: Starting verity-setup.service... Mar 17 19:39:34.139763 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Mar 17 19:39:34.285700 systemd[1]: Found device dev-mapper-usr.device. Mar 17 19:39:34.290802 systemd[1]: Mounting sysusr-usr.mount... Mar 17 19:39:34.296977 systemd[1]: Finished verity-setup.service. Mar 17 19:39:34.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:34.450095 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 19:39:34.450675 systemd[1]: Mounted sysusr-usr.mount. Mar 17 19:39:34.452842 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Mar 17 19:39:34.454482 systemd[1]: Starting ignition-setup.service... Mar 17 19:39:34.457561 systemd[1]: Starting parse-ip-for-networkd.service... Mar 17 19:39:34.480312 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 19:39:34.480358 kernel: BTRFS info (device vda6): using free space tree Mar 17 19:39:34.480371 kernel: BTRFS info (device vda6): has skinny extents Mar 17 19:39:34.509669 systemd[1]: mnt-oem.mount: Deactivated successfully. Mar 17 19:39:34.526456 systemd[1]: Finished ignition-setup.service. Mar 17 19:39:34.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:34.527989 systemd[1]: Starting ignition-fetch-offline.service... Mar 17 19:39:34.590236 systemd[1]: Finished parse-ip-for-networkd.service. Mar 17 19:39:34.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:34.591000 audit: BPF prog-id=9 op=LOAD Mar 17 19:39:34.592728 systemd[1]: Starting systemd-networkd.service... Mar 17 19:39:34.621539 systemd-networkd[642]: lo: Link UP Mar 17 19:39:34.622925 systemd-networkd[642]: lo: Gained carrier Mar 17 19:39:34.624579 systemd-networkd[642]: Enumeration completed Mar 17 19:39:34.625337 systemd[1]: Started systemd-networkd.service. Mar 17 19:39:34.626058 systemd-networkd[642]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 19:39:34.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:34.628559 systemd[1]: Reached target network.target. Mar 17 19:39:34.630208 systemd-networkd[642]: eth0: Link UP Mar 17 19:39:34.630212 systemd-networkd[642]: eth0: Gained carrier Mar 17 19:39:34.632701 systemd[1]: Starting iscsiuio.service... Mar 17 19:39:34.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:34.645248 systemd[1]: Started iscsiuio.service. Mar 17 19:39:34.649464 systemd[1]: Starting iscsid.service... Mar 17 19:39:34.651723 systemd-networkd[642]: eth0: DHCPv4 address 172.24.4.209/24, gateway 172.24.4.1 acquired from 172.24.4.1 Mar 17 19:39:34.656176 iscsid[652]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Mar 17 19:39:34.656176 iscsid[652]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Mar 17 19:39:34.656176 iscsid[652]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Mar 17 19:39:34.656176 iscsid[652]: If using hardware iscsi like qla4xxx this message can be ignored. Mar 17 19:39:34.656176 iscsid[652]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Mar 17 19:39:34.656176 iscsid[652]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Mar 17 19:39:34.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:34.659622 systemd[1]: Started iscsid.service. Mar 17 19:39:34.662533 systemd[1]: Starting dracut-initqueue.service... Mar 17 19:39:34.677977 systemd[1]: Finished dracut-initqueue.service. Mar 17 19:39:34.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:34.678590 systemd[1]: Reached target remote-fs-pre.target. Mar 17 19:39:34.681359 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 19:39:34.684050 systemd[1]: Reached target remote-fs.target. Mar 17 19:39:34.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:34.685509 systemd[1]: Starting dracut-pre-mount.service... Mar 17 19:39:34.693938 systemd[1]: Finished dracut-pre-mount.service. Mar 17 19:39:34.820519 ignition[586]: Ignition 2.14.0 Mar 17 19:39:34.821297 ignition[586]: Stage: fetch-offline Mar 17 19:39:34.823009 ignition[586]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:39:34.823039 ignition[586]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 19:39:34.824252 ignition[586]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 19:39:34.824367 ignition[586]: parsed url from cmdline: "" Mar 17 19:39:34.824372 ignition[586]: no config URL provided Mar 17 19:39:34.824378 ignition[586]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 19:39:34.829522 systemd[1]: Finished ignition-fetch-offline.service. Mar 17 19:39:34.824387 ignition[586]: no config at "/usr/lib/ignition/user.ign" Mar 17 19:39:34.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:34.832267 systemd[1]: Starting ignition-fetch.service... Mar 17 19:39:34.824413 ignition[586]: failed to fetch config: resource requires networking Mar 17 19:39:34.824536 ignition[586]: Ignition finished successfully Mar 17 19:39:34.843029 ignition[666]: Ignition 2.14.0 Mar 17 19:39:34.844420 ignition[666]: Stage: fetch Mar 17 19:39:34.845086 ignition[666]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:39:34.845867 ignition[666]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 19:39:34.846817 ignition[666]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 19:39:34.847678 ignition[666]: parsed url from cmdline: "" Mar 17 19:39:34.847728 ignition[666]: no config URL provided Mar 17 19:39:34.848274 ignition[666]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 19:39:34.848999 ignition[666]: no config at "/usr/lib/ignition/user.ign" Mar 17 19:39:34.856565 ignition[666]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Mar 17 19:39:34.856765 ignition[666]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Mar 17 19:39:34.861403 ignition[666]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Mar 17 19:39:35.071356 ignition[666]: GET result: OK Mar 17 19:39:35.072206 ignition[666]: parsing config with SHA512: 484196bacc34eb6c1dd636a146fd0fc7a6dcaa8e439a6b5055d91e5d48e8eaf4d7a4093ebe4f45984e23905dd0d5b362bc750257fdf609c8d1f571260f585e10 Mar 17 19:39:35.085705 unknown[666]: fetched base config from "system" Mar 17 19:39:35.087317 unknown[666]: fetched base config from "system" Mar 17 19:39:35.088230 unknown[666]: fetched user config from "openstack" Mar 17 19:39:35.088936 ignition[666]: fetch: fetch complete Mar 17 19:39:35.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:35.091571 systemd[1]: Finished ignition-fetch.service. Mar 17 19:39:35.088948 ignition[666]: fetch: fetch passed Mar 17 19:39:35.102787 systemd[1]: Starting ignition-kargs.service... Mar 17 19:39:35.089034 ignition[666]: Ignition finished successfully Mar 17 19:39:35.124893 ignition[672]: Ignition 2.14.0 Mar 17 19:39:35.124919 ignition[672]: Stage: kargs Mar 17 19:39:35.125205 ignition[672]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:39:35.125249 ignition[672]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 19:39:35.127477 ignition[672]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 19:39:35.129563 ignition[672]: kargs: kargs passed Mar 17 19:39:35.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:35.131444 systemd[1]: Finished ignition-kargs.service. Mar 17 19:39:35.129664 ignition[672]: Ignition finished successfully Mar 17 19:39:35.136255 systemd[1]: Starting ignition-disks.service... Mar 17 19:39:35.153490 ignition[678]: Ignition 2.14.0 Mar 17 19:39:35.153518 ignition[678]: Stage: disks Mar 17 19:39:35.153762 ignition[678]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:39:35.153806 ignition[678]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 19:39:35.156179 ignition[678]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 19:39:35.158255 ignition[678]: disks: disks passed Mar 17 19:39:35.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:35.159774 systemd[1]: Finished ignition-disks.service. Mar 17 19:39:35.158349 ignition[678]: Ignition finished successfully Mar 17 19:39:35.162353 systemd[1]: Reached target initrd-root-device.target. Mar 17 19:39:35.164448 systemd[1]: Reached target local-fs-pre.target. Mar 17 19:39:35.166672 systemd[1]: Reached target local-fs.target. Mar 17 19:39:35.169232 systemd[1]: Reached target sysinit.target. Mar 17 19:39:35.171981 systemd[1]: Reached target basic.target. Mar 17 19:39:35.177256 systemd[1]: Starting systemd-fsck-root.service... Mar 17 19:39:35.211915 systemd-fsck[685]: ROOT: clean, 623/1628000 files, 124059/1617920 blocks Mar 17 19:39:35.229397 systemd[1]: Finished systemd-fsck-root.service. Mar 17 19:39:35.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:35.232637 systemd[1]: Mounting sysroot.mount... Mar 17 19:39:35.259102 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 19:39:35.260505 systemd[1]: Mounted sysroot.mount. Mar 17 19:39:35.262437 systemd[1]: Reached target initrd-root-fs.target. Mar 17 19:39:35.267187 systemd[1]: Mounting sysroot-usr.mount... Mar 17 19:39:35.269825 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Mar 17 19:39:35.271579 systemd[1]: Starting flatcar-openstack-hostname.service... Mar 17 19:39:35.272927 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Mar 17 19:39:35.273057 systemd[1]: Reached target ignition-diskful.target. Mar 17 19:39:35.277590 systemd[1]: Mounted sysroot-usr.mount. Mar 17 19:39:35.281403 systemd[1]: Starting initrd-setup-root.service... Mar 17 19:39:35.291319 initrd-setup-root[696]: cut: /sysroot/etc/passwd: No such file or directory Mar 17 19:39:35.313144 initrd-setup-root[704]: cut: /sysroot/etc/group: No such file or directory Mar 17 19:39:35.322823 initrd-setup-root[712]: cut: /sysroot/etc/shadow: No such file or directory Mar 17 19:39:35.330982 initrd-setup-root[720]: cut: /sysroot/etc/gshadow: No such file or directory Mar 17 19:39:35.339808 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 19:39:35.357128 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (727) Mar 17 19:39:35.365188 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 19:39:35.365252 kernel: BTRFS info (device vda6): using free space tree Mar 17 19:39:35.365280 kernel: BTRFS info (device vda6): has skinny extents Mar 17 19:39:35.387590 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 19:39:35.455275 systemd[1]: Finished initrd-setup-root.service. Mar 17 19:39:35.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:35.458498 systemd[1]: Starting ignition-mount.service... Mar 17 19:39:35.461442 systemd[1]: Starting sysroot-boot.service... Mar 17 19:39:35.480861 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Mar 17 19:39:35.482749 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Mar 17 19:39:35.517541 ignition[760]: INFO : Ignition 2.14.0 Mar 17 19:39:35.520512 ignition[760]: INFO : Stage: mount Mar 17 19:39:35.521258 ignition[760]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:39:35.522048 ignition[760]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 19:39:35.524271 ignition[760]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 19:39:35.526229 ignition[760]: INFO : mount: mount passed Mar 17 19:39:35.526874 ignition[760]: INFO : Ignition finished successfully Mar 17 19:39:35.528257 systemd[1]: Finished ignition-mount.service. Mar 17 19:39:35.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:35.538626 systemd[1]: Finished sysroot-boot.service. Mar 17 19:39:35.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:35.542756 coreos-metadata[691]: Mar 17 19:39:35.542 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Mar 17 19:39:35.561126 coreos-metadata[691]: Mar 17 19:39:35.560 INFO Fetch successful Mar 17 19:39:35.561126 coreos-metadata[691]: Mar 17 19:39:35.560 INFO wrote hostname ci-3510-3-7-f-8436352eab.novalocal to /sysroot/etc/hostname Mar 17 19:39:35.565265 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Mar 17 19:39:35.565379 systemd[1]: Finished flatcar-openstack-hostname.service. Mar 17 19:39:35.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:35.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:35.567665 systemd[1]: Starting ignition-files.service... Mar 17 19:39:35.575404 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 19:39:35.586125 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (768) Mar 17 19:39:35.589877 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 19:39:35.589902 kernel: BTRFS info (device vda6): using free space tree Mar 17 19:39:35.589914 kernel: BTRFS info (device vda6): has skinny extents Mar 17 19:39:35.602171 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 19:39:35.620838 ignition[787]: INFO : Ignition 2.14.0 Mar 17 19:39:35.620838 ignition[787]: INFO : Stage: files Mar 17 19:39:35.621955 ignition[787]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:39:35.621955 ignition[787]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 19:39:35.623690 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 19:39:35.629969 ignition[787]: DEBUG : files: compiled without relabeling support, skipping Mar 17 19:39:35.631024 ignition[787]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Mar 17 19:39:35.631024 ignition[787]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Mar 17 19:39:35.636185 ignition[787]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Mar 17 19:39:35.636939 ignition[787]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Mar 17 19:39:35.638528 unknown[787]: wrote ssh authorized keys file for user: core Mar 17 19:39:35.639211 ignition[787]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Mar 17 19:39:35.639910 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Mar 17 19:39:35.640739 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Mar 17 19:39:35.640739 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 19:39:35.642421 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 19:39:35.642421 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Mar 17 19:39:35.642421 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Mar 17 19:39:35.642421 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Mar 17 19:39:35.642421 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Mar 17 19:39:35.844445 systemd-networkd[642]: eth0: Gained IPv6LL Mar 17 19:39:36.064600 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Mar 17 19:39:37.735489 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Mar 17 19:39:37.735489 ignition[787]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Mar 17 19:39:37.735489 ignition[787]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Mar 17 19:39:37.735489 ignition[787]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 19:39:37.756282 ignition[787]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 19:39:37.756282 ignition[787]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Mar 17 19:39:37.756282 ignition[787]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Mar 17 19:39:37.756282 ignition[787]: INFO : files: files passed Mar 17 19:39:37.756282 ignition[787]: INFO : Ignition finished successfully Mar 17 19:39:37.772478 kernel: kauditd_printk_skb: 27 callbacks suppressed Mar 17 19:39:37.772505 kernel: audit: type=1130 audit(1742240377.761:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.757627 systemd[1]: Finished ignition-files.service. Mar 17 19:39:37.766767 systemd[1]: Starting initrd-setup-root-after-ignition.service... Mar 17 19:39:37.774594 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Mar 17 19:39:37.775507 systemd[1]: Starting ignition-quench.service... Mar 17 19:39:37.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.782512 systemd[1]: ignition-quench.service: Deactivated successfully. Mar 17 19:39:37.811898 kernel: audit: type=1130 audit(1742240377.783:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.811954 kernel: audit: type=1131 audit(1742240377.783:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.811984 kernel: audit: type=1130 audit(1742240377.799:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.782608 systemd[1]: Finished ignition-quench.service. Mar 17 19:39:37.813648 initrd-setup-root-after-ignition[812]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Mar 17 19:39:37.799370 systemd[1]: Finished initrd-setup-root-after-ignition.service. Mar 17 19:39:37.800125 systemd[1]: Reached target ignition-complete.target. Mar 17 19:39:37.813282 systemd[1]: Starting initrd-parse-etc.service... Mar 17 19:39:37.837819 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 17 19:39:37.860610 kernel: audit: type=1130 audit(1742240377.838:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.860657 kernel: audit: type=1131 audit(1742240377.838:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.837929 systemd[1]: Finished initrd-parse-etc.service. Mar 17 19:39:37.838608 systemd[1]: Reached target initrd-fs.target. Mar 17 19:39:37.861147 systemd[1]: Reached target initrd.target. Mar 17 19:39:37.862127 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Mar 17 19:39:37.862971 systemd[1]: Starting dracut-pre-pivot.service... Mar 17 19:39:37.877176 systemd[1]: Finished dracut-pre-pivot.service. Mar 17 19:39:37.884163 kernel: audit: type=1130 audit(1742240377.877:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.878796 systemd[1]: Starting initrd-cleanup.service... Mar 17 19:39:37.890390 systemd[1]: Stopped target nss-lookup.target. Mar 17 19:39:37.890996 systemd[1]: Stopped target remote-cryptsetup.target. Mar 17 19:39:37.892334 systemd[1]: Stopped target timers.target. Mar 17 19:39:37.893249 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 17 19:39:37.899440 kernel: audit: type=1131 audit(1742240377.894:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.893417 systemd[1]: Stopped dracut-pre-pivot.service. Mar 17 19:39:37.894322 systemd[1]: Stopped target initrd.target. Mar 17 19:39:37.900167 systemd[1]: Stopped target basic.target. Mar 17 19:39:37.901150 systemd[1]: Stopped target ignition-complete.target. Mar 17 19:39:37.902089 systemd[1]: Stopped target ignition-diskful.target. Mar 17 19:39:37.902998 systemd[1]: Stopped target initrd-root-device.target. Mar 17 19:39:37.903989 systemd[1]: Stopped target remote-fs.target. Mar 17 19:39:37.905086 systemd[1]: Stopped target remote-fs-pre.target. Mar 17 19:39:37.906107 systemd[1]: Stopped target sysinit.target. Mar 17 19:39:37.907010 systemd[1]: Stopped target local-fs.target. Mar 17 19:39:37.908038 systemd[1]: Stopped target local-fs-pre.target. Mar 17 19:39:37.909130 systemd[1]: Stopped target swap.target. Mar 17 19:39:37.915999 kernel: audit: type=1131 audit(1742240377.910:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.909991 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 17 19:39:37.910179 systemd[1]: Stopped dracut-pre-mount.service. Mar 17 19:39:37.922572 kernel: audit: type=1131 audit(1742240377.917:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.911094 systemd[1]: Stopped target cryptsetup.target. Mar 17 19:39:37.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.916594 systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 17 19:39:37.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.916744 systemd[1]: Stopped dracut-initqueue.service. Mar 17 19:39:37.917806 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Mar 17 19:39:37.917969 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Mar 17 19:39:37.930592 iscsid[652]: iscsid shutting down. Mar 17 19:39:37.923272 systemd[1]: ignition-files.service: Deactivated successfully. Mar 17 19:39:37.923417 systemd[1]: Stopped ignition-files.service. Mar 17 19:39:37.925270 systemd[1]: Stopping ignition-mount.service... Mar 17 19:39:37.925967 systemd[1]: Stopping iscsid.service... Mar 17 19:39:37.936482 systemd[1]: Stopping sysroot-boot.service... Mar 17 19:39:37.936989 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 17 19:39:37.937144 systemd[1]: Stopped systemd-udev-trigger.service. Mar 17 19:39:37.940838 ignition[825]: INFO : Ignition 2.14.0 Mar 17 19:39:37.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.941350 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 17 19:39:37.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.941469 systemd[1]: Stopped dracut-pre-trigger.service. Mar 17 19:39:37.943477 ignition[825]: INFO : Stage: umount Mar 17 19:39:37.943477 ignition[825]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:39:37.943477 ignition[825]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 19:39:37.946190 systemd[1]: iscsid.service: Deactivated successfully. Mar 17 19:39:37.946302 systemd[1]: Stopped iscsid.service. Mar 17 19:39:37.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.949495 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 19:39:37.949495 ignition[825]: INFO : umount: umount passed Mar 17 19:39:37.949495 ignition[825]: INFO : Ignition finished successfully Mar 17 19:39:37.949930 systemd[1]: ignition-mount.service: Deactivated successfully. Mar 17 19:39:37.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.950010 systemd[1]: Stopped ignition-mount.service. Mar 17 19:39:37.954120 systemd[1]: ignition-disks.service: Deactivated successfully. Mar 17 19:39:37.954242 systemd[1]: Stopped ignition-disks.service. Mar 17 19:39:37.954767 systemd[1]: ignition-kargs.service: Deactivated successfully. Mar 17 19:39:37.954869 systemd[1]: Stopped ignition-kargs.service. Mar 17 19:39:37.955490 systemd[1]: ignition-fetch.service: Deactivated successfully. Mar 17 19:39:37.955592 systemd[1]: Stopped ignition-fetch.service. Mar 17 19:39:37.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.956175 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Mar 17 19:39:37.956278 systemd[1]: Stopped ignition-fetch-offline.service. Mar 17 19:39:37.956886 systemd[1]: Stopped target paths.target. Mar 17 19:39:37.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.958088 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 17 19:39:37.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.959863 systemd[1]: Stopped systemd-ask-password-console.path. Mar 17 19:39:37.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.960648 systemd[1]: Stopped target slices.target. Mar 17 19:39:37.961148 systemd[1]: Stopped target sockets.target. Mar 17 19:39:37.961603 systemd[1]: iscsid.socket: Deactivated successfully. Mar 17 19:39:37.961637 systemd[1]: Closed iscsid.socket. Mar 17 19:39:37.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.964136 systemd[1]: ignition-setup.service: Deactivated successfully. Mar 17 19:39:37.964180 systemd[1]: Stopped ignition-setup.service. Mar 17 19:39:37.965998 systemd[1]: Stopping iscsiuio.service... Mar 17 19:39:37.968200 systemd[1]: sysroot-boot.mount: Deactivated successfully. Mar 17 19:39:37.968668 systemd[1]: iscsiuio.service: Deactivated successfully. Mar 17 19:39:37.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.969143 systemd[1]: Stopped iscsiuio.service. Mar 17 19:39:37.973984 systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 17 19:39:37.974085 systemd[1]: Finished initrd-cleanup.service. Mar 17 19:39:37.974819 systemd[1]: sysroot-boot.service: Deactivated successfully. Mar 17 19:39:37.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.974893 systemd[1]: Stopped sysroot-boot.service. Mar 17 19:39:37.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.976682 systemd[1]: Stopped target network.target. Mar 17 19:39:37.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.977356 systemd[1]: iscsiuio.socket: Deactivated successfully. Mar 17 19:39:37.977393 systemd[1]: Closed iscsiuio.socket. Mar 17 19:39:37.978310 systemd[1]: initrd-setup-root.service: Deactivated successfully. Mar 17 19:39:37.978352 systemd[1]: Stopped initrd-setup-root.service. Mar 17 19:39:37.979489 systemd[1]: Stopping systemd-networkd.service... Mar 17 19:39:37.980784 systemd[1]: Stopping systemd-resolved.service... Mar 17 19:39:37.982119 systemd-networkd[642]: eth0: DHCPv6 lease lost Mar 17 19:39:37.999000 audit: BPF prog-id=9 op=UNLOAD Mar 17 19:39:37.982968 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 19:39:37.983058 systemd[1]: Stopped systemd-networkd.service. Mar 17 19:39:38.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.984620 systemd[1]: systemd-networkd.socket: Deactivated successfully. Mar 17 19:39:37.984653 systemd[1]: Closed systemd-networkd.socket. Mar 17 19:39:38.003000 audit: BPF prog-id=6 op=UNLOAD Mar 17 19:39:37.985875 systemd[1]: Stopping network-cleanup.service... Mar 17 19:39:37.987817 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Mar 17 19:39:38.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.987875 systemd[1]: Stopped parse-ip-for-networkd.service. Mar 17 19:39:38.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.989013 systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 17 19:39:37.989052 systemd[1]: Stopped systemd-sysctl.service. Mar 17 19:39:37.990229 systemd[1]: systemd-modules-load.service: Deactivated successfully. Mar 17 19:39:38.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.990269 systemd[1]: Stopped systemd-modules-load.service. Mar 17 19:39:38.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:37.991080 systemd[1]: Stopping systemd-udevd.service... Mar 17 19:39:38.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:38.000018 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 17 19:39:38.000544 systemd[1]: systemd-resolved.service: Deactivated successfully. Mar 17 19:39:38.000649 systemd[1]: Stopped systemd-resolved.service. Mar 17 19:39:38.004976 systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 17 19:39:38.005131 systemd[1]: Stopped systemd-udevd.service. Mar 17 19:39:38.006540 systemd[1]: network-cleanup.service: Deactivated successfully. Mar 17 19:39:38.006623 systemd[1]: Stopped network-cleanup.service. Mar 17 19:39:38.007496 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 17 19:39:38.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:38.007532 systemd[1]: Closed systemd-udevd-control.socket. Mar 17 19:39:38.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:38.008432 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 17 19:39:38.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:38.008461 systemd[1]: Closed systemd-udevd-kernel.socket. Mar 17 19:39:38.009442 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 17 19:39:38.009479 systemd[1]: Stopped dracut-pre-udev.service. Mar 17 19:39:38.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:38.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:38.010437 systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 17 19:39:38.010472 systemd[1]: Stopped dracut-cmdline.service. Mar 17 19:39:38.011567 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Mar 17 19:39:38.011603 systemd[1]: Stopped dracut-cmdline-ask.service. Mar 17 19:39:38.013269 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Mar 17 19:39:38.019859 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Mar 17 19:39:38.019934 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Mar 17 19:39:38.021289 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 17 19:39:38.021333 systemd[1]: Stopped kmod-static-nodes.service. Mar 17 19:39:38.021987 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 17 19:39:38.022023 systemd[1]: Stopped systemd-vconsole-setup.service. Mar 17 19:39:38.023828 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Mar 17 19:39:38.024327 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 17 19:39:38.024411 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Mar 17 19:39:38.025324 systemd[1]: Reached target initrd-switch-root.target. Mar 17 19:39:38.026779 systemd[1]: Starting initrd-switch-root.service... Mar 17 19:39:38.045000 systemd[1]: Switching root. Mar 17 19:39:38.064354 systemd-journald[185]: Journal stopped Mar 17 19:39:42.874494 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Mar 17 19:39:42.874562 kernel: SELinux: Class mctp_socket not defined in policy. Mar 17 19:39:42.874585 kernel: SELinux: Class anon_inode not defined in policy. Mar 17 19:39:42.874598 kernel: SELinux: the above unknown classes and permissions will be allowed Mar 17 19:39:42.874615 kernel: SELinux: policy capability network_peer_controls=1 Mar 17 19:39:42.874626 kernel: SELinux: policy capability open_perms=1 Mar 17 19:39:42.874638 kernel: SELinux: policy capability extended_socket_class=1 Mar 17 19:39:42.874649 kernel: SELinux: policy capability always_check_network=0 Mar 17 19:39:42.874666 kernel: SELinux: policy capability cgroup_seclabel=1 Mar 17 19:39:42.874677 kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 17 19:39:42.874690 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Mar 17 19:39:42.874701 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Mar 17 19:39:42.874713 systemd[1]: Successfully loaded SELinux policy in 103.950ms. Mar 17 19:39:42.874738 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.367ms. Mar 17 19:39:42.874753 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 19:39:42.874765 systemd[1]: Detected virtualization kvm. Mar 17 19:39:42.874778 systemd[1]: Detected architecture x86-64. Mar 17 19:39:42.874790 systemd[1]: Detected first boot. Mar 17 19:39:42.874805 systemd[1]: Hostname set to . Mar 17 19:39:42.874818 systemd[1]: Initializing machine ID from VM UUID. Mar 17 19:39:42.874830 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Mar 17 19:39:42.874842 systemd[1]: Populated /etc with preset unit settings. Mar 17 19:39:42.874855 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 19:39:42.874869 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 19:39:42.874883 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 19:39:42.874898 systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 17 19:39:42.874910 systemd[1]: Stopped initrd-switch-root.service. Mar 17 19:39:42.874923 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 17 19:39:42.874937 systemd[1]: Created slice system-addon\x2dconfig.slice. Mar 17 19:39:42.874953 systemd[1]: Created slice system-addon\x2drun.slice. Mar 17 19:39:42.874968 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Mar 17 19:39:42.874980 systemd[1]: Created slice system-getty.slice. Mar 17 19:39:42.874993 systemd[1]: Created slice system-modprobe.slice. Mar 17 19:39:42.875005 systemd[1]: Created slice system-serial\x2dgetty.slice. Mar 17 19:39:42.875018 systemd[1]: Created slice system-system\x2dcloudinit.slice. Mar 17 19:39:42.875031 systemd[1]: Created slice system-systemd\x2dfsck.slice. Mar 17 19:39:42.875043 systemd[1]: Created slice user.slice. Mar 17 19:39:42.875055 systemd[1]: Started systemd-ask-password-console.path. Mar 17 19:39:42.875135 systemd[1]: Started systemd-ask-password-wall.path. Mar 17 19:39:42.875150 systemd[1]: Set up automount boot.automount. Mar 17 19:39:42.875163 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Mar 17 19:39:42.875176 systemd[1]: Stopped target initrd-switch-root.target. Mar 17 19:39:42.875187 systemd[1]: Stopped target initrd-fs.target. Mar 17 19:39:42.875200 systemd[1]: Stopped target initrd-root-fs.target. Mar 17 19:39:42.875214 systemd[1]: Reached target integritysetup.target. Mar 17 19:39:42.875227 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 19:39:42.875245 systemd[1]: Reached target remote-fs.target. Mar 17 19:39:42.875257 systemd[1]: Reached target slices.target. Mar 17 19:39:42.875269 systemd[1]: Reached target swap.target. Mar 17 19:39:42.875281 systemd[1]: Reached target torcx.target. Mar 17 19:39:42.875294 systemd[1]: Reached target veritysetup.target. Mar 17 19:39:42.875306 systemd[1]: Listening on systemd-coredump.socket. Mar 17 19:39:42.875318 systemd[1]: Listening on systemd-initctl.socket. Mar 17 19:39:42.875330 systemd[1]: Listening on systemd-networkd.socket. Mar 17 19:39:42.875345 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 19:39:42.875357 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 19:39:42.875371 systemd[1]: Listening on systemd-userdbd.socket. Mar 17 19:39:42.875383 systemd[1]: Mounting dev-hugepages.mount... Mar 17 19:39:42.875395 systemd[1]: Mounting dev-mqueue.mount... Mar 17 19:39:42.875408 systemd[1]: Mounting media.mount... Mar 17 19:39:42.875420 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:39:42.875432 systemd[1]: Mounting sys-kernel-debug.mount... Mar 17 19:39:42.875445 systemd[1]: Mounting sys-kernel-tracing.mount... Mar 17 19:39:42.875462 systemd[1]: Mounting tmp.mount... Mar 17 19:39:42.875475 systemd[1]: Starting flatcar-tmpfiles.service... Mar 17 19:39:42.875488 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 19:39:42.875500 systemd[1]: Starting kmod-static-nodes.service... Mar 17 19:39:42.875512 systemd[1]: Starting modprobe@configfs.service... Mar 17 19:39:42.875524 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 19:39:42.875536 systemd[1]: Starting modprobe@drm.service... Mar 17 19:39:42.875548 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 19:39:42.875561 systemd[1]: Starting modprobe@fuse.service... Mar 17 19:39:42.875576 systemd[1]: Starting modprobe@loop.service... Mar 17 19:39:42.875589 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Mar 17 19:39:42.875601 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 17 19:39:42.875615 systemd[1]: Stopped systemd-fsck-root.service. Mar 17 19:39:42.875626 kernel: kauditd_printk_skb: 71 callbacks suppressed Mar 17 19:39:42.875640 kernel: audit: type=1131 audit(1742240382.771:112): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.875652 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Mar 17 19:39:42.875665 systemd[1]: Stopped systemd-fsck-usr.service. Mar 17 19:39:42.875681 systemd[1]: Stopped systemd-journald.service. Mar 17 19:39:42.875694 kernel: audit: type=1131 audit(1742240382.784:113): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.875706 kernel: audit: type=1130 audit(1742240382.791:114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.875717 kernel: audit: type=1131 audit(1742240382.791:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.875729 systemd[1]: Starting systemd-journald.service... Mar 17 19:39:42.875740 kernel: loop: module loaded Mar 17 19:39:42.875750 kernel: audit: type=1334 audit(1742240382.801:116): prog-id=21 op=LOAD Mar 17 19:39:42.875761 kernel: audit: type=1334 audit(1742240382.801:117): prog-id=22 op=LOAD Mar 17 19:39:42.875773 kernel: fuse: init (API version 7.34) Mar 17 19:39:42.875784 kernel: audit: type=1334 audit(1742240382.801:118): prog-id=23 op=LOAD Mar 17 19:39:42.875794 systemd[1]: Starting systemd-modules-load.service... Mar 17 19:39:42.875805 kernel: audit: type=1334 audit(1742240382.803:119): prog-id=19 op=UNLOAD Mar 17 19:39:42.875816 kernel: audit: type=1334 audit(1742240382.803:120): prog-id=20 op=UNLOAD Mar 17 19:39:42.875826 systemd[1]: Starting systemd-network-generator.service... Mar 17 19:39:42.875838 systemd[1]: Starting systemd-remount-fs.service... Mar 17 19:39:42.875849 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 19:39:42.875860 systemd[1]: verity-setup.service: Deactivated successfully. Mar 17 19:39:42.875874 systemd[1]: Stopped verity-setup.service. Mar 17 19:39:42.875887 kernel: audit: type=1131 audit(1742240382.841:121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.875898 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:39:42.875909 systemd[1]: Mounted dev-hugepages.mount. Mar 17 19:39:42.875921 systemd[1]: Mounted dev-mqueue.mount. Mar 17 19:39:42.875932 systemd[1]: Mounted media.mount. Mar 17 19:39:42.875943 systemd[1]: Mounted sys-kernel-debug.mount. Mar 17 19:39:42.875954 systemd[1]: Mounted sys-kernel-tracing.mount. Mar 17 19:39:42.875966 systemd[1]: Mounted tmp.mount. Mar 17 19:39:42.875979 systemd[1]: Finished kmod-static-nodes.service. Mar 17 19:39:42.875990 systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 17 19:39:42.876002 systemd[1]: Finished modprobe@configfs.service. Mar 17 19:39:42.876016 systemd-journald[935]: Journal started Mar 17 19:39:42.876075 systemd-journald[935]: Runtime Journal (/run/log/journal/1eda2386a93c425eb906d81a61f5cd63) is 8.0M, max 78.4M, 70.4M free. Mar 17 19:39:38.391000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 19:39:38.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 19:39:38.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 19:39:38.527000 audit: BPF prog-id=10 op=LOAD Mar 17 19:39:38.527000 audit: BPF prog-id=10 op=UNLOAD Mar 17 19:39:38.527000 audit: BPF prog-id=11 op=LOAD Mar 17 19:39:38.527000 audit: BPF prog-id=11 op=UNLOAD Mar 17 19:39:38.683000 audit[857]: AVC avc: denied { associate } for pid=857 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 19:39:38.683000 audit[857]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d89c a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=840 pid=857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:39:38.683000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 19:39:38.686000 audit[857]: AVC avc: denied { associate } for pid=857 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Mar 17 19:39:38.686000 audit[857]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d975 a2=1ed a3=0 items=2 ppid=840 pid=857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:39:38.686000 audit: CWD cwd="/" Mar 17 19:39:38.686000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:38.686000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:38.686000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 19:39:42.594000 audit: BPF prog-id=12 op=LOAD Mar 17 19:39:42.594000 audit: BPF prog-id=3 op=UNLOAD Mar 17 19:39:42.594000 audit: BPF prog-id=13 op=LOAD Mar 17 19:39:42.594000 audit: BPF prog-id=14 op=LOAD Mar 17 19:39:42.594000 audit: BPF prog-id=4 op=UNLOAD Mar 17 19:39:42.594000 audit: BPF prog-id=5 op=UNLOAD Mar 17 19:39:42.595000 audit: BPF prog-id=15 op=LOAD Mar 17 19:39:42.595000 audit: BPF prog-id=12 op=UNLOAD Mar 17 19:39:42.595000 audit: BPF prog-id=16 op=LOAD Mar 17 19:39:42.595000 audit: BPF prog-id=17 op=LOAD Mar 17 19:39:42.595000 audit: BPF prog-id=13 op=UNLOAD Mar 17 19:39:42.595000 audit: BPF prog-id=14 op=UNLOAD Mar 17 19:39:42.596000 audit: BPF prog-id=18 op=LOAD Mar 17 19:39:42.596000 audit: BPF prog-id=15 op=UNLOAD Mar 17 19:39:42.880165 systemd[1]: Started systemd-journald.service. Mar 17 19:39:42.596000 audit: BPF prog-id=19 op=LOAD Mar 17 19:39:42.596000 audit: BPF prog-id=20 op=LOAD Mar 17 19:39:42.596000 audit: BPF prog-id=16 op=UNLOAD Mar 17 19:39:42.596000 audit: BPF prog-id=17 op=UNLOAD Mar 17 19:39:42.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.607000 audit: BPF prog-id=18 op=UNLOAD Mar 17 19:39:42.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.801000 audit: BPF prog-id=21 op=LOAD Mar 17 19:39:42.801000 audit: BPF prog-id=22 op=LOAD Mar 17 19:39:42.801000 audit: BPF prog-id=23 op=LOAD Mar 17 19:39:42.803000 audit: BPF prog-id=19 op=UNLOAD Mar 17 19:39:42.803000 audit: BPF prog-id=20 op=UNLOAD Mar 17 19:39:42.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.872000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Mar 17 19:39:42.872000 audit[935]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffc93417f00 a2=4000 a3=7ffc93417f9c items=0 ppid=1 pid=935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:39:42.872000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Mar 17 19:39:42.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.592766 systemd[1]: Queued start job for default target multi-user.target. Mar 17 19:39:38.680174 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 19:39:42.592778 systemd[1]: Unnecessary job was removed for dev-vda6.device. Mar 17 19:39:38.681107 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 19:39:42.597425 systemd[1]: systemd-journald.service: Deactivated successfully. Mar 17 19:39:38.681132 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 19:39:42.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.879808 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 19:39:38.681174 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Mar 17 19:39:42.879937 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 19:39:38.681188 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=debug msg="skipped missing lower profile" missing profile=oem Mar 17 19:39:42.880846 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 19:39:38.681224 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Mar 17 19:39:42.880977 systemd[1]: Finished modprobe@drm.service. Mar 17 19:39:38.681251 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Mar 17 19:39:42.882687 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 19:39:38.681480 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Mar 17 19:39:42.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.882793 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 19:39:38.681522 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 19:39:42.883575 systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 17 19:39:38.681538 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 19:39:38.682744 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Mar 17 19:39:38.682784 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Mar 17 19:39:38.682809 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Mar 17 19:39:38.682828 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Mar 17 19:39:38.682850 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Mar 17 19:39:38.682869 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Mar 17 19:39:42.045432 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:42Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 19:39:42.045752 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:42Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 19:39:42.045872 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:42Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 19:39:42.046096 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:42Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 19:39:42.046161 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:42Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Mar 17 19:39:42.046233 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-03-17T19:39:42Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Mar 17 19:39:42.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.885823 systemd[1]: Finished modprobe@fuse.service. Mar 17 19:39:42.886759 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 19:39:42.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.887082 systemd[1]: Finished modprobe@loop.service. Mar 17 19:39:42.888026 systemd[1]: Finished systemd-modules-load.service. Mar 17 19:39:42.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.888860 systemd[1]: Finished systemd-network-generator.service. Mar 17 19:39:42.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.889698 systemd[1]: Finished systemd-remount-fs.service. Mar 17 19:39:42.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.890577 systemd[1]: Reached target network-pre.target. Mar 17 19:39:42.892498 systemd[1]: Mounting sys-fs-fuse-connections.mount... Mar 17 19:39:42.894019 systemd[1]: Mounting sys-kernel-config.mount... Mar 17 19:39:42.894832 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Mar 17 19:39:42.898096 systemd[1]: Starting systemd-hwdb-update.service... Mar 17 19:39:42.899498 systemd[1]: Starting systemd-journal-flush.service... Mar 17 19:39:42.900008 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 19:39:42.900989 systemd[1]: Starting systemd-random-seed.service... Mar 17 19:39:42.901519 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 19:39:42.902837 systemd[1]: Starting systemd-sysctl.service... Mar 17 19:39:42.907466 systemd[1]: Mounted sys-fs-fuse-connections.mount. Mar 17 19:39:42.908012 systemd[1]: Mounted sys-kernel-config.mount. Mar 17 19:39:42.914912 systemd-journald[935]: Time spent on flushing to /var/log/journal/1eda2386a93c425eb906d81a61f5cd63 is 27.262ms for 1104 entries. Mar 17 19:39:42.914912 systemd-journald[935]: System Journal (/var/log/journal/1eda2386a93c425eb906d81a61f5cd63) is 8.0M, max 584.8M, 576.8M free. Mar 17 19:39:43.006533 systemd-journald[935]: Received client request to flush runtime journal. Mar 17 19:39:42.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:43.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:42.923737 systemd[1]: Finished flatcar-tmpfiles.service. Mar 17 19:39:42.925788 systemd[1]: Starting systemd-sysusers.service... Mar 17 19:39:43.010746 udevadm[967]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Mar 17 19:39:42.933191 systemd[1]: Finished systemd-random-seed.service. Mar 17 19:39:42.933947 systemd[1]: Reached target first-boot-complete.target. Mar 17 19:39:42.944006 systemd[1]: Finished systemd-sysctl.service. Mar 17 19:39:42.954730 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 19:39:42.956316 systemd[1]: Starting systemd-udev-settle.service... Mar 17 19:39:43.008004 systemd[1]: Finished systemd-journal-flush.service. Mar 17 19:39:43.150008 systemd[1]: Finished systemd-sysusers.service. Mar 17 19:39:43.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:43.154249 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 19:39:43.318748 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 19:39:43.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:43.757455 systemd[1]: Finished systemd-hwdb-update.service. Mar 17 19:39:43.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:43.760000 audit: BPF prog-id=24 op=LOAD Mar 17 19:39:43.760000 audit: BPF prog-id=25 op=LOAD Mar 17 19:39:43.760000 audit: BPF prog-id=7 op=UNLOAD Mar 17 19:39:43.760000 audit: BPF prog-id=8 op=UNLOAD Mar 17 19:39:43.761458 systemd[1]: Starting systemd-udevd.service... Mar 17 19:39:43.803285 systemd-udevd[972]: Using default interface naming scheme 'v252'. Mar 17 19:39:43.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:43.880000 audit: BPF prog-id=26 op=LOAD Mar 17 19:39:43.876212 systemd[1]: Started systemd-udevd.service. Mar 17 19:39:43.885972 systemd[1]: Starting systemd-networkd.service... Mar 17 19:39:43.906000 audit: BPF prog-id=27 op=LOAD Mar 17 19:39:43.906000 audit: BPF prog-id=28 op=LOAD Mar 17 19:39:43.906000 audit: BPF prog-id=29 op=LOAD Mar 17 19:39:43.908501 systemd[1]: Starting systemd-userdbd.service... Mar 17 19:39:43.949165 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Mar 17 19:39:43.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:43.976426 systemd[1]: Started systemd-userdbd.service. Mar 17 19:39:44.010778 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 19:39:44.045098 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Mar 17 19:39:44.054098 kernel: ACPI: button: Power Button [PWRF] Mar 17 19:39:44.084058 systemd-networkd[985]: lo: Link UP Mar 17 19:39:44.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.084407 systemd-networkd[985]: lo: Gained carrier Mar 17 19:39:44.084854 systemd-networkd[985]: Enumeration completed Mar 17 19:39:44.084937 systemd[1]: Started systemd-networkd.service. Mar 17 19:39:44.086674 systemd-networkd[985]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 19:39:44.088462 systemd-networkd[985]: eth0: Link UP Mar 17 19:39:44.088542 systemd-networkd[985]: eth0: Gained carrier Mar 17 19:39:44.096234 systemd-networkd[985]: eth0: DHCPv4 address 172.24.4.209/24, gateway 172.24.4.1 acquired from 172.24.4.1 Mar 17 19:39:44.066000 audit[983]: AVC avc: denied { confidentiality } for pid=983 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 19:39:44.066000 audit[983]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d0a5151ca0 a1=338ac a2=7faf45e2abc5 a3=5 items=110 ppid=972 pid=983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:39:44.066000 audit: CWD cwd="/" Mar 17 19:39:44.066000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=1 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=2 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=3 name=(null) inode=14418 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=4 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=5 name=(null) inode=14419 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=6 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=7 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=8 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=9 name=(null) inode=14421 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=10 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=11 name=(null) inode=14422 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=12 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=13 name=(null) inode=14423 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=14 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=15 name=(null) inode=14424 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=16 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=17 name=(null) inode=14425 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=18 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=19 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=20 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=21 name=(null) inode=14427 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=22 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=23 name=(null) inode=14428 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=24 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=25 name=(null) inode=14429 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=26 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=27 name=(null) inode=14430 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=28 name=(null) inode=14426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=29 name=(null) inode=14431 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=30 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=31 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=32 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=33 name=(null) inode=14433 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=34 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=35 name=(null) inode=14434 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=36 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=37 name=(null) inode=14435 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=38 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=39 name=(null) inode=14436 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=40 name=(null) inode=14432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=41 name=(null) inode=14437 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=42 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=43 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=44 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=45 name=(null) inode=14439 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=46 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=47 name=(null) inode=14440 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=48 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=49 name=(null) inode=14441 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=50 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=51 name=(null) inode=14442 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=52 name=(null) inode=14438 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=53 name=(null) inode=14443 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=55 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=56 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=57 name=(null) inode=14445 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=58 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=59 name=(null) inode=14446 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=60 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=61 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=62 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=63 name=(null) inode=14448 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=64 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=65 name=(null) inode=14449 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=66 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=67 name=(null) inode=14450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=68 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=69 name=(null) inode=14451 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=70 name=(null) inode=14447 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=71 name=(null) inode=14452 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=72 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=73 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=74 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=75 name=(null) inode=14454 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=76 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=77 name=(null) inode=14455 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=78 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=79 name=(null) inode=14456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=80 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=81 name=(null) inode=14457 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=82 name=(null) inode=14453 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=83 name=(null) inode=14458 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=84 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=85 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=86 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=87 name=(null) inode=14460 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=88 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=89 name=(null) inode=14461 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=90 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=91 name=(null) inode=14462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=92 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=93 name=(null) inode=14463 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=94 name=(null) inode=14459 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=95 name=(null) inode=14464 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=96 name=(null) inode=14444 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=97 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=98 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=99 name=(null) inode=14466 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=100 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=101 name=(null) inode=14467 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=102 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=103 name=(null) inode=14468 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=104 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=105 name=(null) inode=14469 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=106 name=(null) inode=14465 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=107 name=(null) inode=14470 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PATH item=109 name=(null) inode=14471 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:39:44.066000 audit: PROCTITLE proctitle="(udev-worker)" Mar 17 19:39:44.118118 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Mar 17 19:39:44.120096 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Mar 17 19:39:44.128099 kernel: mousedev: PS/2 mouse device common for all mice Mar 17 19:39:44.180508 systemd[1]: Finished systemd-udev-settle.service. Mar 17 19:39:44.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.182487 systemd[1]: Starting lvm2-activation-early.service... Mar 17 19:39:44.214081 lvm[1006]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 19:39:44.240053 systemd[1]: Finished lvm2-activation-early.service. Mar 17 19:39:44.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.240769 systemd[1]: Reached target cryptsetup.target. Mar 17 19:39:44.242451 systemd[1]: Starting lvm2-activation.service... Mar 17 19:39:44.251794 lvm[1007]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 19:39:44.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.291237 systemd[1]: Finished lvm2-activation.service. Mar 17 19:39:44.291849 systemd[1]: Reached target local-fs-pre.target. Mar 17 19:39:44.292346 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 17 19:39:44.292369 systemd[1]: Reached target local-fs.target. Mar 17 19:39:44.292805 systemd[1]: Reached target machines.target. Mar 17 19:39:44.294544 systemd[1]: Starting ldconfig.service... Mar 17 19:39:44.296277 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 19:39:44.296344 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:39:44.297712 systemd[1]: Starting systemd-boot-update.service... Mar 17 19:39:44.299894 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Mar 17 19:39:44.302757 systemd[1]: Starting systemd-machine-id-commit.service... Mar 17 19:39:44.307520 systemd[1]: Starting systemd-sysext.service... Mar 17 19:39:44.321102 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1009 (bootctl) Mar 17 19:39:44.323846 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Mar 17 19:39:44.337033 systemd[1]: Unmounting usr-share-oem.mount... Mar 17 19:39:44.368117 systemd[1]: usr-share-oem.mount: Deactivated successfully. Mar 17 19:39:44.368418 systemd[1]: Unmounted usr-share-oem.mount. Mar 17 19:39:44.415983 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Mar 17 19:39:44.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.427142 kernel: loop0: detected capacity change from 0 to 210664 Mar 17 19:39:44.626992 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Mar 17 19:39:44.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.630108 systemd[1]: Finished systemd-machine-id-commit.service. Mar 17 19:39:44.681170 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 17 19:39:44.722157 kernel: loop1: detected capacity change from 0 to 210664 Mar 17 19:39:44.821643 (sd-sysext)[1022]: Using extensions 'kubernetes'. Mar 17 19:39:44.825973 (sd-sysext)[1022]: Merged extensions into '/usr'. Mar 17 19:39:44.866966 systemd-fsck[1019]: fsck.fat 4.2 (2021-01-31) Mar 17 19:39:44.866966 systemd-fsck[1019]: /dev/vda1: 789 files, 119299/258078 clusters Mar 17 19:39:44.872661 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:39:44.875901 systemd[1]: Mounting usr-share-oem.mount... Mar 17 19:39:44.878422 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 19:39:44.882489 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 19:39:44.886866 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 19:39:44.894476 systemd[1]: Starting modprobe@loop.service... Mar 17 19:39:44.895525 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 19:39:44.895791 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:39:44.896051 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:39:44.899594 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Mar 17 19:39:44.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.900496 systemd[1]: Mounted usr-share-oem.mount. Mar 17 19:39:44.901302 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 19:39:44.901434 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 19:39:44.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.902317 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 19:39:44.902463 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 19:39:44.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.903471 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 19:39:44.903595 systemd[1]: Finished modprobe@loop.service. Mar 17 19:39:44.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.906386 systemd[1]: Mounting boot.mount... Mar 17 19:39:44.908204 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 19:39:44.908273 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 19:39:44.908780 systemd[1]: Finished systemd-sysext.service. Mar 17 19:39:44.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:44.911598 systemd[1]: Starting ensure-sysext.service... Mar 17 19:39:44.913334 systemd[1]: Starting systemd-tmpfiles-setup.service... Mar 17 19:39:44.927364 systemd[1]: Mounted boot.mount. Mar 17 19:39:44.928453 systemd[1]: Reloading. Mar 17 19:39:44.942034 systemd-tmpfiles[1030]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Mar 17 19:39:44.944612 systemd-tmpfiles[1030]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Mar 17 19:39:44.949240 systemd-tmpfiles[1030]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Mar 17 19:39:45.008800 /usr/lib/systemd/system-generators/torcx-generator[1049]: time="2025-03-17T19:39:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 19:39:45.008836 /usr/lib/systemd/system-generators/torcx-generator[1049]: time="2025-03-17T19:39:45Z" level=info msg="torcx already run" Mar 17 19:39:45.163664 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 19:39:45.163685 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 19:39:45.192741 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 19:39:45.252381 systemd-networkd[985]: eth0: Gained IPv6LL Mar 17 19:39:45.268000 audit: BPF prog-id=30 op=LOAD Mar 17 19:39:45.268000 audit: BPF prog-id=26 op=UNLOAD Mar 17 19:39:45.270000 audit: BPF prog-id=31 op=LOAD Mar 17 19:39:45.270000 audit: BPF prog-id=21 op=UNLOAD Mar 17 19:39:45.270000 audit: BPF prog-id=32 op=LOAD Mar 17 19:39:45.270000 audit: BPF prog-id=33 op=LOAD Mar 17 19:39:45.270000 audit: BPF prog-id=22 op=UNLOAD Mar 17 19:39:45.270000 audit: BPF prog-id=23 op=UNLOAD Mar 17 19:39:45.273000 audit: BPF prog-id=34 op=LOAD Mar 17 19:39:45.273000 audit: BPF prog-id=27 op=UNLOAD Mar 17 19:39:45.273000 audit: BPF prog-id=35 op=LOAD Mar 17 19:39:45.273000 audit: BPF prog-id=36 op=LOAD Mar 17 19:39:45.273000 audit: BPF prog-id=28 op=UNLOAD Mar 17 19:39:45.273000 audit: BPF prog-id=29 op=UNLOAD Mar 17 19:39:45.274000 audit: BPF prog-id=37 op=LOAD Mar 17 19:39:45.274000 audit: BPF prog-id=38 op=LOAD Mar 17 19:39:45.274000 audit: BPF prog-id=24 op=UNLOAD Mar 17 19:39:45.274000 audit: BPF prog-id=25 op=UNLOAD Mar 17 19:39:45.283336 systemd[1]: Finished systemd-boot-update.service. Mar 17 19:39:45.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.285529 systemd[1]: Finished systemd-tmpfiles-setup.service. Mar 17 19:39:45.291075 systemd[1]: Starting audit-rules.service... Mar 17 19:39:45.292909 systemd[1]: Starting clean-ca-certificates.service... Mar 17 19:39:45.295153 systemd[1]: Starting systemd-journal-catalog-update.service... Mar 17 19:39:45.299000 audit: BPF prog-id=39 op=LOAD Mar 17 19:39:45.302021 systemd[1]: Starting systemd-resolved.service... Mar 17 19:39:45.303000 audit: BPF prog-id=40 op=LOAD Mar 17 19:39:45.304542 systemd[1]: Starting systemd-timesyncd.service... Mar 17 19:39:45.308141 systemd[1]: Starting systemd-update-utmp.service... Mar 17 19:39:45.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.309768 systemd[1]: Finished clean-ca-certificates.service. Mar 17 19:39:45.314216 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 19:39:45.322000 audit[1103]: SYSTEM_BOOT pid=1103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.324834 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 19:39:45.326569 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 19:39:45.329671 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 19:39:45.333306 systemd[1]: Starting modprobe@loop.service... Mar 17 19:39:45.333901 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 19:39:45.334141 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:39:45.334408 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 19:39:45.336359 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 19:39:45.336513 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 19:39:45.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.339594 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 19:39:45.339735 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 19:39:45.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.341319 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 19:39:45.341769 systemd[1]: Finished modprobe@loop.service. Mar 17 19:39:45.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.346317 systemd[1]: Finished systemd-update-utmp.service. Mar 17 19:39:45.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.348978 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 19:39:45.351642 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 19:39:45.355202 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 19:39:45.357218 systemd[1]: Starting modprobe@loop.service... Mar 17 19:39:45.359178 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 19:39:45.359360 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:39:45.359533 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 19:39:45.360589 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 19:39:45.360743 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 19:39:45.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.366346 systemd[1]: Finished systemd-journal-catalog-update.service. Mar 17 19:39:45.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.367503 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 19:39:45.367638 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 19:39:45.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.368898 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:39:45.369574 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 19:39:45.371504 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 19:39:45.374748 systemd[1]: Starting modprobe@drm.service... Mar 17 19:39:45.375480 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 19:39:45.375662 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:39:45.377221 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 19:39:45.377830 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 19:39:45.378017 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 19:39:45.378730 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:39:45.380049 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 19:39:45.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.381282 systemd[1]: Finished modprobe@loop.service. Mar 17 19:39:45.384194 systemd[1]: Finished ensure-sysext.service. Mar 17 19:39:45.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.385970 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 19:39:45.386183 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 19:39:45.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.386764 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 19:39:45.387985 ldconfig[1008]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Mar 17 19:39:45.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.396653 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 19:39:45.396808 systemd[1]: Finished modprobe@drm.service. Mar 17 19:39:45.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.402878 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 19:39:45.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.404745 systemd[1]: Finished ldconfig.service. Mar 17 19:39:45.406557 systemd[1]: Starting systemd-update-done.service... Mar 17 19:39:45.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:39:45.420168 systemd[1]: Finished systemd-update-done.service. Mar 17 19:39:45.449000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 19:39:45.449000 audit[1128]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcbca26260 a2=420 a3=0 items=0 ppid=1097 pid=1128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:39:45.449000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 19:39:45.450269 systemd[1]: Finished audit-rules.service. Mar 17 19:39:45.451496 augenrules[1128]: No rules Mar 17 19:39:45.451761 systemd[1]: Started systemd-timesyncd.service. Mar 17 19:39:45.452337 systemd[1]: Reached target time-set.target. Mar 17 19:39:45.485276 systemd-resolved[1100]: Positive Trust Anchors: Mar 17 19:39:45.485297 systemd-resolved[1100]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 19:39:45.485346 systemd-resolved[1100]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 19:39:45.496724 systemd-resolved[1100]: Using system hostname 'ci-3510-3-7-f-8436352eab.novalocal'. Mar 17 19:39:45.498416 systemd[1]: Started systemd-resolved.service. Mar 17 19:39:45.499860 systemd[1]: Reached target network.target. Mar 17 19:39:45.501162 systemd[1]: Reached target network-online.target. Mar 17 19:39:45.502457 systemd[1]: Reached target nss-lookup.target. Mar 17 19:39:45.503787 systemd[1]: Reached target sysinit.target. Mar 17 19:39:45.505257 systemd[1]: Started motdgen.path. Mar 17 19:39:45.506516 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Mar 17 19:39:45.509237 systemd[1]: Started logrotate.timer. Mar 17 19:39:45.510587 systemd[1]: Started mdadm.timer. Mar 17 19:39:45.511685 systemd[1]: Started systemd-tmpfiles-clean.timer. Mar 17 19:39:45.512979 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Mar 17 19:39:45.513051 systemd[1]: Reached target paths.target. Mar 17 19:39:45.514353 systemd[1]: Reached target timers.target. Mar 17 19:39:45.516800 systemd[1]: Listening on dbus.socket. Mar 17 19:39:45.520004 systemd[1]: Starting docker.socket... Mar 17 19:39:45.527767 systemd[1]: Listening on sshd.socket. Mar 17 19:39:45.529217 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:39:45.530179 systemd[1]: Listening on docker.socket. Mar 17 19:39:45.531456 systemd[1]: Reached target sockets.target. Mar 17 19:39:45.532640 systemd[1]: Reached target basic.target. Mar 17 19:39:45.533955 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 19:39:45.534030 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 19:39:45.536598 systemd[1]: Starting containerd.service... Mar 17 19:39:45.540156 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Mar 17 19:39:45.543657 systemd[1]: Starting dbus.service... Mar 17 19:39:45.549280 systemd[1]: Starting enable-oem-cloudinit.service... Mar 17 19:39:45.562388 systemd[1]: Starting extend-filesystems.service... Mar 17 19:39:45.970719 systemd-timesyncd[1102]: Contacted time server 217.180.209.214:123 (0.flatcar.pool.ntp.org). Mar 17 19:39:45.970784 systemd-timesyncd[1102]: Initial clock synchronization to Mon 2025-03-17 19:39:45.970606 UTC. Mar 17 19:39:45.970939 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Mar 17 19:39:45.974351 systemd[1]: Starting kubelet.service... Mar 17 19:39:45.977270 systemd-resolved[1100]: Clock change detected. Flushing caches. Mar 17 19:39:45.977764 systemd[1]: Starting motdgen.service... Mar 17 19:39:45.980137 systemd[1]: Starting ssh-key-proc-cmdline.service... Mar 17 19:39:45.982761 systemd[1]: Starting sshd-keygen.service... Mar 17 19:39:45.986990 systemd[1]: Starting systemd-logind.service... Mar 17 19:39:45.987578 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:39:45.987662 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Mar 17 19:39:45.988194 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Mar 17 19:39:45.991125 systemd[1]: Starting update-engine.service... Mar 17 19:39:45.993377 systemd[1]: Starting update-ssh-keys-after-ignition.service... Mar 17 19:39:46.003098 systemd[1]: Created slice system-sshd.slice. Mar 17 19:39:46.005108 jq[1141]: false Mar 17 19:39:46.016602 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Mar 17 19:39:46.016858 systemd[1]: Finished ssh-key-proc-cmdline.service. Mar 17 19:39:46.019007 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Mar 17 19:39:46.019167 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Mar 17 19:39:46.020982 jq[1152]: true Mar 17 19:39:46.053357 jq[1160]: true Mar 17 19:39:46.063649 extend-filesystems[1143]: Found loop1 Mar 17 19:39:46.064573 extend-filesystems[1143]: Found vda Mar 17 19:39:46.064573 extend-filesystems[1143]: Found vda1 Mar 17 19:39:46.064573 extend-filesystems[1143]: Found vda2 Mar 17 19:39:46.064573 extend-filesystems[1143]: Found vda3 Mar 17 19:39:46.064573 extend-filesystems[1143]: Found usr Mar 17 19:39:46.064573 extend-filesystems[1143]: Found vda4 Mar 17 19:39:46.064573 extend-filesystems[1143]: Found vda6 Mar 17 19:39:46.064573 extend-filesystems[1143]: Found vda7 Mar 17 19:39:46.064573 extend-filesystems[1143]: Found vda9 Mar 17 19:39:46.064573 extend-filesystems[1143]: Checking size of /dev/vda9 Mar 17 19:39:46.070575 dbus-daemon[1140]: [system] SELinux support is enabled Mar 17 19:39:46.070723 systemd[1]: Started dbus.service. Mar 17 19:39:46.076271 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Mar 17 19:39:46.076300 systemd[1]: Reached target system-config.target. Mar 17 19:39:46.076958 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Mar 17 19:39:46.076979 systemd[1]: Reached target user-config.target. Mar 17 19:39:46.083209 systemd[1]: motdgen.service: Deactivated successfully. Mar 17 19:39:46.083381 systemd[1]: Finished motdgen.service. Mar 17 19:39:46.108576 extend-filesystems[1143]: Resized partition /dev/vda9 Mar 17 19:39:46.116427 extend-filesystems[1187]: resize2fs 1.46.5 (30-Dec-2021) Mar 17 19:39:46.161167 env[1158]: time="2025-03-17T19:39:46.161078845Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Mar 17 19:39:46.167470 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 2014203 blocks Mar 17 19:39:46.173235 systemd-logind[1150]: Watching system buttons on /dev/input/event1 (Power Button) Mar 17 19:39:46.173473 systemd-logind[1150]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Mar 17 19:39:46.174848 kernel: EXT4-fs (vda9): resized filesystem to 2014203 Mar 17 19:39:46.176615 systemd-logind[1150]: New seat seat0. Mar 17 19:39:46.242164 env[1158]: time="2025-03-17T19:39:46.207320872Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 17 19:39:46.242244 update_engine[1151]: I0317 19:39:46.203778 1151 main.cc:92] Flatcar Update Engine starting Mar 17 19:39:46.242244 update_engine[1151]: I0317 19:39:46.228574 1151 update_check_scheduler.cc:74] Next update check in 4m50s Mar 17 19:39:46.182902 systemd[1]: Started systemd-logind.service. Mar 17 19:39:46.228524 systemd[1]: Started update-engine.service. Mar 17 19:39:46.231466 systemd[1]: Started locksmithd.service. Mar 17 19:39:46.243388 extend-filesystems[1187]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Mar 17 19:39:46.243388 extend-filesystems[1187]: old_desc_blocks = 1, new_desc_blocks = 1 Mar 17 19:39:46.243388 extend-filesystems[1187]: The filesystem on /dev/vda9 is now 2014203 (4k) blocks long. Mar 17 19:39:46.247335 extend-filesystems[1143]: Resized filesystem in /dev/vda9 Mar 17 19:39:46.248215 env[1158]: time="2025-03-17T19:39:46.244399333Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 17 19:39:46.248215 env[1158]: time="2025-03-17T19:39:46.247517100Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.179-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 17 19:39:46.248215 env[1158]: time="2025-03-17T19:39:46.247559259Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 17 19:39:46.244033 systemd[1]: extend-filesystems.service: Deactivated successfully. Mar 17 19:39:46.253731 env[1158]: time="2025-03-17T19:39:46.252376965Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 19:39:46.253731 env[1158]: time="2025-03-17T19:39:46.252401511Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 17 19:39:46.253731 env[1158]: time="2025-03-17T19:39:46.252418353Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 17 19:39:46.253731 env[1158]: time="2025-03-17T19:39:46.252434934Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 17 19:39:46.253731 env[1158]: time="2025-03-17T19:39:46.252549669Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 17 19:39:46.253731 env[1158]: time="2025-03-17T19:39:46.252831217Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 17 19:39:46.253731 env[1158]: time="2025-03-17T19:39:46.253005163Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 19:39:46.253731 env[1158]: time="2025-03-17T19:39:46.253027465Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 17 19:39:46.253731 env[1158]: time="2025-03-17T19:39:46.253097356Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 17 19:39:46.253731 env[1158]: time="2025-03-17T19:39:46.253116572Z" level=info msg="metadata content store policy set" policy=shared Mar 17 19:39:46.244205 systemd[1]: Finished extend-filesystems.service. Mar 17 19:39:46.293313 bash[1191]: Updated "/home/core/.ssh/authorized_keys" Mar 17 19:39:46.295158 systemd[1]: Finished update-ssh-keys-after-ignition.service. Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.303897522Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.303947596Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.303965139Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.304014882Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.304034298Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.304050318Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.304123075Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.304142020Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.304157790Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.304172858Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.304187476Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.304202604Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.304316978Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 17 19:39:46.305533 env[1158]: time="2025-03-17T19:39:46.304407689Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304711058Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304740573Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304757214Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304804002Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304836703Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304851631Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304865818Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304881557Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304895764Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304909710Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304923065Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.304939286Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.305076743Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.305096601Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.314209 env[1158]: time="2025-03-17T19:39:46.305110817Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.306747 systemd[1]: Started containerd.service. Mar 17 19:39:46.315260 env[1158]: time="2025-03-17T19:39:46.305124232Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 17 19:39:46.315260 env[1158]: time="2025-03-17T19:39:46.305142497Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 17 19:39:46.315260 env[1158]: time="2025-03-17T19:39:46.305157835Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 17 19:39:46.315260 env[1158]: time="2025-03-17T19:39:46.305181510Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 17 19:39:46.315260 env[1158]: time="2025-03-17T19:39:46.305218028Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.305436578Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.305505427Z" level=info msg="Connect containerd service" Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.305540463Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.306232761Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.306484614Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.306530229Z" level=info msg=serving... address=/run/containerd/containerd.sock Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.306585503Z" level=info msg="containerd successfully booted in 0.151652s" Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.307372860Z" level=info msg="Start subscribing containerd event" Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.307437351Z" level=info msg="Start recovering state" Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.307538530Z" level=info msg="Start event monitor" Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.307604234Z" level=info msg="Start snapshots syncer" Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.307616647Z" level=info msg="Start cni network conf syncer for default" Mar 17 19:39:46.315538 env[1158]: time="2025-03-17T19:39:46.307632447Z" level=info msg="Start streaming server" Mar 17 19:39:46.530611 locksmithd[1196]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Mar 17 19:39:46.842866 sshd_keygen[1171]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Mar 17 19:39:46.867393 systemd[1]: Finished sshd-keygen.service. Mar 17 19:39:46.871153 systemd[1]: Starting issuegen.service... Mar 17 19:39:46.874388 systemd[1]: Started sshd@0-172.24.4.209:22-172.24.4.1:37380.service. Mar 17 19:39:46.881336 systemd[1]: issuegen.service: Deactivated successfully. Mar 17 19:39:46.881672 systemd[1]: Finished issuegen.service. Mar 17 19:39:46.885512 systemd[1]: Starting systemd-user-sessions.service... Mar 17 19:39:46.896260 systemd[1]: Finished systemd-user-sessions.service. Mar 17 19:39:46.898570 systemd[1]: Started getty@tty1.service. Mar 17 19:39:46.900695 systemd[1]: Started serial-getty@ttyS0.service. Mar 17 19:39:46.901517 systemd[1]: Reached target getty.target. Mar 17 19:39:48.227345 systemd[1]: Started kubelet.service. Mar 17 19:39:48.235598 sshd[1212]: Accepted publickey for core from 172.24.4.1 port 37380 ssh2: RSA SHA256:0qismvO9/NycYojDPV3BgQur5FYKlC/KcDYVOn7KNLI Mar 17 19:39:48.239116 sshd[1212]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:39:48.272094 systemd[1]: Created slice user-500.slice. Mar 17 19:39:48.276692 systemd[1]: Starting user-runtime-dir@500.service... Mar 17 19:39:48.287763 systemd-logind[1150]: New session 1 of user core. Mar 17 19:39:48.299966 systemd[1]: Finished user-runtime-dir@500.service. Mar 17 19:39:48.302551 systemd[1]: Starting user@500.service... Mar 17 19:39:48.316146 (systemd)[1224]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:39:48.406597 systemd[1224]: Queued start job for default target default.target. Mar 17 19:39:48.407164 systemd[1224]: Reached target paths.target. Mar 17 19:39:48.407185 systemd[1224]: Reached target sockets.target. Mar 17 19:39:48.407200 systemd[1224]: Reached target timers.target. Mar 17 19:39:48.407214 systemd[1224]: Reached target basic.target. Mar 17 19:39:48.407315 systemd[1]: Started user@500.service. Mar 17 19:39:48.408672 systemd[1]: Started session-1.scope. Mar 17 19:39:48.409484 systemd[1224]: Reached target default.target. Mar 17 19:39:48.409625 systemd[1224]: Startup finished in 84ms. Mar 17 19:39:48.898267 systemd[1]: Started sshd@1-172.24.4.209:22-172.24.4.1:37384.service. Mar 17 19:39:49.713041 kubelet[1222]: E0317 19:39:49.712925 1222 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:39:49.717904 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:39:49.718197 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:39:49.718703 systemd[1]: kubelet.service: Consumed 2.214s CPU time. Mar 17 19:39:50.225347 sshd[1238]: Accepted publickey for core from 172.24.4.1 port 37384 ssh2: RSA SHA256:0qismvO9/NycYojDPV3BgQur5FYKlC/KcDYVOn7KNLI Mar 17 19:39:50.227932 sshd[1238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:39:50.240338 systemd[1]: Started session-2.scope. Mar 17 19:39:50.240783 systemd-logind[1150]: New session 2 of user core. Mar 17 19:39:51.003433 sshd[1238]: pam_unix(sshd:session): session closed for user core Mar 17 19:39:51.011710 systemd[1]: Started sshd@2-172.24.4.209:22-172.24.4.1:37388.service. Mar 17 19:39:51.020122 systemd[1]: sshd@1-172.24.4.209:22-172.24.4.1:37384.service: Deactivated successfully. Mar 17 19:39:51.022185 systemd[1]: session-2.scope: Deactivated successfully. Mar 17 19:39:51.026082 systemd-logind[1150]: Session 2 logged out. Waiting for processes to exit. Mar 17 19:39:51.028200 systemd-logind[1150]: Removed session 2. Mar 17 19:39:52.612846 sshd[1244]: Accepted publickey for core from 172.24.4.1 port 37388 ssh2: RSA SHA256:0qismvO9/NycYojDPV3BgQur5FYKlC/KcDYVOn7KNLI Mar 17 19:39:52.616591 sshd[1244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:39:52.628665 systemd-logind[1150]: New session 3 of user core. Mar 17 19:39:52.629333 systemd[1]: Started session-3.scope. Mar 17 19:39:53.089673 coreos-metadata[1137]: Mar 17 19:39:53.089 WARN failed to locate config-drive, using the metadata service API instead Mar 17 19:39:53.178016 coreos-metadata[1137]: Mar 17 19:39:53.177 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Mar 17 19:39:53.229687 sshd[1244]: pam_unix(sshd:session): session closed for user core Mar 17 19:39:53.234243 systemd[1]: sshd@2-172.24.4.209:22-172.24.4.1:37388.service: Deactivated successfully. Mar 17 19:39:53.235118 systemd[1]: session-3.scope: Deactivated successfully. Mar 17 19:39:53.236777 systemd-logind[1150]: Session 3 logged out. Waiting for processes to exit. Mar 17 19:39:53.239331 systemd-logind[1150]: Removed session 3. Mar 17 19:39:53.435088 coreos-metadata[1137]: Mar 17 19:39:53.433 INFO Fetch successful Mar 17 19:39:53.435487 coreos-metadata[1137]: Mar 17 19:39:53.435 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Mar 17 19:39:53.449283 coreos-metadata[1137]: Mar 17 19:39:53.449 INFO Fetch successful Mar 17 19:39:53.456034 unknown[1137]: wrote ssh authorized keys file for user: core Mar 17 19:39:53.491156 update-ssh-keys[1252]: Updated "/home/core/.ssh/authorized_keys" Mar 17 19:39:53.493125 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Mar 17 19:39:53.494032 systemd[1]: Reached target multi-user.target. Mar 17 19:39:53.496969 systemd[1]: Starting systemd-update-utmp-runlevel.service... Mar 17 19:39:53.516180 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 17 19:39:53.516664 systemd[1]: Finished systemd-update-utmp-runlevel.service. Mar 17 19:39:53.517172 systemd[1]: Startup finished in 1.028s (kernel) + 6.553s (initrd) + 14.850s (userspace) = 22.432s. Mar 17 19:39:59.970049 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Mar 17 19:39:59.970513 systemd[1]: Stopped kubelet.service. Mar 17 19:39:59.970604 systemd[1]: kubelet.service: Consumed 2.214s CPU time. Mar 17 19:39:59.973582 systemd[1]: Starting kubelet.service... Mar 17 19:40:00.215199 systemd[1]: Started kubelet.service. Mar 17 19:40:00.298404 kubelet[1258]: E0317 19:40:00.297909 1258 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:40:00.306404 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:40:00.306707 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:40:03.240282 systemd[1]: Started sshd@3-172.24.4.209:22-172.24.4.1:35778.service. Mar 17 19:40:04.640754 sshd[1266]: Accepted publickey for core from 172.24.4.1 port 35778 ssh2: RSA SHA256:0qismvO9/NycYojDPV3BgQur5FYKlC/KcDYVOn7KNLI Mar 17 19:40:04.644306 sshd[1266]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:40:04.655202 systemd-logind[1150]: New session 4 of user core. Mar 17 19:40:04.656027 systemd[1]: Started session-4.scope. Mar 17 19:40:05.282674 sshd[1266]: pam_unix(sshd:session): session closed for user core Mar 17 19:40:05.290920 systemd[1]: sshd@3-172.24.4.209:22-172.24.4.1:35778.service: Deactivated successfully. Mar 17 19:40:05.292313 systemd[1]: session-4.scope: Deactivated successfully. Mar 17 19:40:05.293872 systemd-logind[1150]: Session 4 logged out. Waiting for processes to exit. Mar 17 19:40:05.296775 systemd[1]: Started sshd@4-172.24.4.209:22-172.24.4.1:55422.service. Mar 17 19:40:05.300680 systemd-logind[1150]: Removed session 4. Mar 17 19:40:06.752745 sshd[1272]: Accepted publickey for core from 172.24.4.1 port 55422 ssh2: RSA SHA256:0qismvO9/NycYojDPV3BgQur5FYKlC/KcDYVOn7KNLI Mar 17 19:40:06.755586 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:40:06.766142 systemd-logind[1150]: New session 5 of user core. Mar 17 19:40:06.767011 systemd[1]: Started session-5.scope. Mar 17 19:40:07.312749 sshd[1272]: pam_unix(sshd:session): session closed for user core Mar 17 19:40:07.318760 systemd[1]: Started sshd@5-172.24.4.209:22-172.24.4.1:55428.service. Mar 17 19:40:07.322069 systemd[1]: sshd@4-172.24.4.209:22-172.24.4.1:55422.service: Deactivated successfully. Mar 17 19:40:07.324000 systemd[1]: session-5.scope: Deactivated successfully. Mar 17 19:40:07.327084 systemd-logind[1150]: Session 5 logged out. Waiting for processes to exit. Mar 17 19:40:07.329993 systemd-logind[1150]: Removed session 5. Mar 17 19:40:08.781178 sshd[1277]: Accepted publickey for core from 172.24.4.1 port 55428 ssh2: RSA SHA256:0qismvO9/NycYojDPV3BgQur5FYKlC/KcDYVOn7KNLI Mar 17 19:40:08.784684 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:40:08.795135 systemd-logind[1150]: New session 6 of user core. Mar 17 19:40:08.796051 systemd[1]: Started session-6.scope. Mar 17 19:40:09.423780 sshd[1277]: pam_unix(sshd:session): session closed for user core Mar 17 19:40:09.429935 systemd[1]: Started sshd@6-172.24.4.209:22-172.24.4.1:55436.service. Mar 17 19:40:09.435327 systemd[1]: sshd@5-172.24.4.209:22-172.24.4.1:55428.service: Deactivated successfully. Mar 17 19:40:09.436929 systemd[1]: session-6.scope: Deactivated successfully. Mar 17 19:40:09.439759 systemd-logind[1150]: Session 6 logged out. Waiting for processes to exit. Mar 17 19:40:09.442298 systemd-logind[1150]: Removed session 6. Mar 17 19:40:10.558604 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Mar 17 19:40:10.559199 systemd[1]: Stopped kubelet.service. Mar 17 19:40:10.562084 systemd[1]: Starting kubelet.service... Mar 17 19:40:10.716160 systemd[1]: Started kubelet.service. Mar 17 19:40:10.893187 sshd[1283]: Accepted publickey for core from 172.24.4.1 port 55436 ssh2: RSA SHA256:0qismvO9/NycYojDPV3BgQur5FYKlC/KcDYVOn7KNLI Mar 17 19:40:10.895724 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:40:10.907617 systemd-logind[1150]: New session 7 of user core. Mar 17 19:40:10.908116 systemd[1]: Started session-7.scope. Mar 17 19:40:11.009445 kubelet[1290]: E0317 19:40:11.009354 1290 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:40:11.011785 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:40:11.012140 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:40:11.347979 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Mar 17 19:40:11.349081 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 19:40:11.362155 dbus-daemon[1140]: \xd0\xcdb=\xe6U: received setenforce notice (enforcing=-422329680) Mar 17 19:40:11.365059 sudo[1297]: pam_unix(sudo:session): session closed for user root Mar 17 19:40:11.530209 sshd[1283]: pam_unix(sshd:session): session closed for user core Mar 17 19:40:11.537697 systemd[1]: Started sshd@7-172.24.4.209:22-172.24.4.1:55442.service. Mar 17 19:40:11.541903 systemd[1]: sshd@6-172.24.4.209:22-172.24.4.1:55436.service: Deactivated successfully. Mar 17 19:40:11.543548 systemd[1]: session-7.scope: Deactivated successfully. Mar 17 19:40:11.546331 systemd-logind[1150]: Session 7 logged out. Waiting for processes to exit. Mar 17 19:40:11.548928 systemd-logind[1150]: Removed session 7. Mar 17 19:40:12.916353 sshd[1300]: Accepted publickey for core from 172.24.4.1 port 55442 ssh2: RSA SHA256:0qismvO9/NycYojDPV3BgQur5FYKlC/KcDYVOn7KNLI Mar 17 19:40:12.919380 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:40:12.929916 systemd-logind[1150]: New session 8 of user core. Mar 17 19:40:12.930588 systemd[1]: Started session-8.scope. Mar 17 19:40:13.334253 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Mar 17 19:40:13.335374 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 19:40:13.340388 sudo[1305]: pam_unix(sudo:session): session closed for user root Mar 17 19:40:13.345869 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Mar 17 19:40:13.346336 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 19:40:13.360801 systemd[1]: Stopping audit-rules.service... Mar 17 19:40:13.362000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 19:40:13.365002 kernel: kauditd_printk_skb: 215 callbacks suppressed Mar 17 19:40:13.365111 kernel: audit: type=1305 audit(1742240413.362:220): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 19:40:13.365586 auditctl[1308]: No rules Mar 17 19:40:13.362000 audit[1308]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc78c5e320 a2=420 a3=0 items=0 ppid=1 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:13.368971 systemd[1]: audit-rules.service: Deactivated successfully. Mar 17 19:40:13.369405 systemd[1]: Stopped audit-rules.service. Mar 17 19:40:13.381303 kernel: audit: type=1300 audit(1742240413.362:220): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc78c5e320 a2=420 a3=0 items=0 ppid=1 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:13.381373 kernel: audit: type=1327 audit(1742240413.362:220): proctitle=2F7362696E2F617564697463746C002D44 Mar 17 19:40:13.381396 kernel: audit: type=1131 audit(1742240413.368:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:13.362000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Mar 17 19:40:13.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:13.373387 systemd[1]: Starting audit-rules.service... Mar 17 19:40:13.410685 augenrules[1325]: No rules Mar 17 19:40:13.412040 systemd[1]: Finished audit-rules.service. Mar 17 19:40:13.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:13.417891 kernel: audit: type=1130 audit(1742240413.411:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:13.417962 sudo[1304]: pam_unix(sudo:session): session closed for user root Mar 17 19:40:13.417000 audit[1304]: USER_END pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:40:13.417000 audit[1304]: CRED_DISP pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:40:13.434100 kernel: audit: type=1106 audit(1742240413.417:223): pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:40:13.434215 kernel: audit: type=1104 audit(1742240413.417:224): pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:40:13.564888 sshd[1300]: pam_unix(sshd:session): session closed for user core Mar 17 19:40:13.570000 audit[1300]: USER_END pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Mar 17 19:40:13.575174 systemd[1]: Started sshd@8-172.24.4.209:22-172.24.4.1:54674.service. Mar 17 19:40:13.580514 systemd[1]: sshd@7-172.24.4.209:22-172.24.4.1:55442.service: Deactivated successfully. Mar 17 19:40:13.582068 systemd[1]: session-8.scope: Deactivated successfully. Mar 17 19:40:13.587915 kernel: audit: type=1106 audit(1742240413.570:225): pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Mar 17 19:40:13.570000 audit[1300]: CRED_DISP pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Mar 17 19:40:13.604745 systemd-logind[1150]: Session 8 logged out. Waiting for processes to exit. Mar 17 19:40:13.605074 kernel: audit: type=1104 audit(1742240413.570:226): pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Mar 17 19:40:13.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.209:22-172.24.4.1:54674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:13.619899 kernel: audit: type=1130 audit(1742240413.570:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.209:22-172.24.4.1:54674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:13.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.209:22-172.24.4.1:55442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:13.621062 systemd-logind[1150]: Removed session 8. Mar 17 19:40:14.612000 audit[1330]: USER_ACCT pid=1330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Mar 17 19:40:14.613487 sshd[1330]: Accepted publickey for core from 172.24.4.1 port 54674 ssh2: RSA SHA256:0qismvO9/NycYojDPV3BgQur5FYKlC/KcDYVOn7KNLI Mar 17 19:40:14.620000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Mar 17 19:40:14.621000 audit[1330]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcad7a99f0 a2=3 a3=0 items=0 ppid=1 pid=1330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:14.621000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:40:14.623055 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:40:14.635562 systemd-logind[1150]: New session 9 of user core. Mar 17 19:40:14.636258 systemd[1]: Started session-9.scope. Mar 17 19:40:14.647000 audit[1330]: USER_START pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Mar 17 19:40:14.650000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Mar 17 19:40:15.170000 audit[1334]: USER_ACCT pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:40:15.171518 sudo[1334]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Mar 17 19:40:15.171000 audit[1334]: CRED_REFR pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:40:15.172306 sudo[1334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 19:40:15.175000 audit[1334]: USER_START pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:40:15.205588 systemd[1]: Starting coreos-metadata.service... Mar 17 19:40:21.263957 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Mar 17 19:40:21.264659 systemd[1]: Stopped kubelet.service. Mar 17 19:40:21.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:21.282005 kernel: kauditd_printk_skb: 11 callbacks suppressed Mar 17 19:40:21.282152 kernel: audit: type=1130 audit(1742240421.262:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:21.271039 systemd[1]: Starting kubelet.service... Mar 17 19:40:21.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:21.297009 kernel: audit: type=1131 audit(1742240421.262:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:21.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:21.513412 systemd[1]: Started kubelet.service. Mar 17 19:40:21.525843 kernel: audit: type=1130 audit(1742240421.512:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:21.593641 kubelet[1347]: E0317 19:40:21.593542 1347 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:40:21.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 19:40:21.595511 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:40:21.595666 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:40:21.608089 kernel: audit: type=1131 audit(1742240421.595:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 19:40:22.281206 coreos-metadata[1338]: Mar 17 19:40:22.281 WARN failed to locate config-drive, using the metadata service API instead Mar 17 19:40:22.370754 coreos-metadata[1338]: Mar 17 19:40:22.370 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Mar 17 19:40:22.558459 coreos-metadata[1338]: Mar 17 19:40:22.558 INFO Fetch successful Mar 17 19:40:22.558459 coreos-metadata[1338]: Mar 17 19:40:22.558 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Mar 17 19:40:22.572637 coreos-metadata[1338]: Mar 17 19:40:22.572 INFO Fetch successful Mar 17 19:40:22.572637 coreos-metadata[1338]: Mar 17 19:40:22.572 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Mar 17 19:40:22.588437 coreos-metadata[1338]: Mar 17 19:40:22.588 INFO Fetch successful Mar 17 19:40:22.588437 coreos-metadata[1338]: Mar 17 19:40:22.588 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Mar 17 19:40:22.602321 coreos-metadata[1338]: Mar 17 19:40:22.602 INFO Fetch successful Mar 17 19:40:22.602321 coreos-metadata[1338]: Mar 17 19:40:22.602 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Mar 17 19:40:22.618699 coreos-metadata[1338]: Mar 17 19:40:22.618 INFO Fetch successful Mar 17 19:40:22.636383 systemd[1]: Finished coreos-metadata.service. Mar 17 19:40:22.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:22.652911 kernel: audit: type=1130 audit(1742240422.637:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:24.500485 systemd[1]: Stopped kubelet.service. Mar 17 19:40:24.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:24.527591 kernel: audit: type=1130 audit(1742240424.500:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:24.527686 kernel: audit: type=1131 audit(1742240424.504:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:24.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:24.527012 systemd[1]: Starting kubelet.service... Mar 17 19:40:24.559591 systemd[1]: Reloading. Mar 17 19:40:24.655763 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-03-17T19:40:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 19:40:24.656163 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-03-17T19:40:24Z" level=info msg="torcx already run" Mar 17 19:40:24.750776 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 19:40:24.751563 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 19:40:24.776335 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 19:40:24.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.863930 kernel: audit: type=1400 audit(1742240424.852:244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.863981 kernel: audit: type=1400 audit(1742240424.852:245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868447 kernel: audit: type=1400 audit(1742240424.852:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.857000 audit: BPF prog-id=46 op=LOAD Mar 17 19:40:24.857000 audit: BPF prog-id=39 op=UNLOAD Mar 17 19:40:24.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.862000 audit: BPF prog-id=47 op=LOAD Mar 17 19:40:24.862000 audit: BPF prog-id=30 op=UNLOAD Mar 17 19:40:24.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.867000 audit: BPF prog-id=48 op=LOAD Mar 17 19:40:24.868000 audit: BPF prog-id=31 op=UNLOAD Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit: BPF prog-id=49 op=LOAD Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.868000 audit: BPF prog-id=50 op=LOAD Mar 17 19:40:24.868000 audit: BPF prog-id=32 op=UNLOAD Mar 17 19:40:24.868000 audit: BPF prog-id=33 op=UNLOAD Mar 17 19:40:24.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.869000 audit: BPF prog-id=51 op=LOAD Mar 17 19:40:24.869000 audit: BPF prog-id=40 op=UNLOAD Mar 17 19:40:24.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.874000 audit: BPF prog-id=52 op=LOAD Mar 17 19:40:24.874000 audit: BPF prog-id=41 op=UNLOAD Mar 17 19:40:24.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.875000 audit: BPF prog-id=53 op=LOAD Mar 17 19:40:24.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.875000 audit: BPF prog-id=54 op=LOAD Mar 17 19:40:24.875000 audit: BPF prog-id=42 op=UNLOAD Mar 17 19:40:24.875000 audit: BPF prog-id=43 op=UNLOAD Mar 17 19:40:24.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit: BPF prog-id=55 op=LOAD Mar 17 19:40:24.878000 audit: BPF prog-id=34 op=UNLOAD Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit: BPF prog-id=56 op=LOAD Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.878000 audit: BPF prog-id=57 op=LOAD Mar 17 19:40:24.878000 audit: BPF prog-id=35 op=UNLOAD Mar 17 19:40:24.878000 audit: BPF prog-id=36 op=UNLOAD Mar 17 19:40:24.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.880000 audit: BPF prog-id=58 op=LOAD Mar 17 19:40:24.880000 audit: BPF prog-id=44 op=UNLOAD Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit: BPF prog-id=59 op=LOAD Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:24.881000 audit: BPF prog-id=60 op=LOAD Mar 17 19:40:24.881000 audit: BPF prog-id=37 op=UNLOAD Mar 17 19:40:24.881000 audit: BPF prog-id=38 op=UNLOAD Mar 17 19:40:24.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:24.907360 systemd[1]: Started kubelet.service. Mar 17 19:40:24.918940 systemd[1]: Stopping kubelet.service... Mar 17 19:40:24.920867 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 19:40:24.921053 systemd[1]: Stopped kubelet.service. Mar 17 19:40:24.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:24.922507 systemd[1]: Starting kubelet.service... Mar 17 19:40:25.012782 systemd[1]: Started kubelet.service. Mar 17 19:40:25.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:25.066704 kubelet[1468]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 19:40:25.067079 kubelet[1468]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Mar 17 19:40:25.067134 kubelet[1468]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 19:40:25.067286 kubelet[1468]: I0317 19:40:25.067255 1468 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 19:40:26.083150 kubelet[1468]: I0317 19:40:26.083110 1468 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Mar 17 19:40:26.084001 kubelet[1468]: I0317 19:40:26.083988 1468 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 19:40:26.084342 kubelet[1468]: I0317 19:40:26.084327 1468 server.go:927] "Client rotation is on, will bootstrap in background" Mar 17 19:40:26.128593 kubelet[1468]: I0317 19:40:26.128529 1468 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 19:40:26.148650 kubelet[1468]: I0317 19:40:26.148593 1468 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 19:40:26.152528 kubelet[1468]: I0317 19:40:26.152466 1468 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 19:40:26.153108 kubelet[1468]: I0317 19:40:26.152654 1468 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.24.4.209","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Mar 17 19:40:26.153393 kubelet[1468]: I0317 19:40:26.153371 1468 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 19:40:26.153518 kubelet[1468]: I0317 19:40:26.153501 1468 container_manager_linux.go:301] "Creating device plugin manager" Mar 17 19:40:26.153780 kubelet[1468]: I0317 19:40:26.153759 1468 state_mem.go:36] "Initialized new in-memory state store" Mar 17 19:40:26.155730 kubelet[1468]: I0317 19:40:26.155692 1468 kubelet.go:400] "Attempting to sync node with API server" Mar 17 19:40:26.156264 kubelet[1468]: I0317 19:40:26.156208 1468 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 19:40:26.156360 kubelet[1468]: I0317 19:40:26.156322 1468 kubelet.go:312] "Adding apiserver pod source" Mar 17 19:40:26.156418 kubelet[1468]: I0317 19:40:26.156399 1468 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 19:40:26.156708 kubelet[1468]: E0317 19:40:26.156644 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:26.157107 kubelet[1468]: E0317 19:40:26.156990 1468 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:26.166637 kubelet[1468]: I0317 19:40:26.166602 1468 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 19:40:26.172712 kubelet[1468]: W0317 19:40:26.172670 1468 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.24.4.209" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Mar 17 19:40:26.172971 kubelet[1468]: E0317 19:40:26.172947 1468 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.209" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Mar 17 19:40:26.173361 kubelet[1468]: W0317 19:40:26.173333 1468 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Mar 17 19:40:26.173530 kubelet[1468]: E0317 19:40:26.173508 1468 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Mar 17 19:40:26.174015 kubelet[1468]: I0317 19:40:26.173991 1468 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 19:40:26.174206 kubelet[1468]: W0317 19:40:26.174187 1468 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Mar 17 19:40:26.175316 kubelet[1468]: I0317 19:40:26.175274 1468 server.go:1264] "Started kubelet" Mar 17 19:40:26.180000 audit[1468]: AVC avc: denied { mac_admin } for pid=1468 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:26.180000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 19:40:26.180000 audit[1468]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a139e0 a1=c00064fcc8 a2=c000a139b0 a3=25 items=0 ppid=1 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.180000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 19:40:26.184401 kubelet[1468]: I0317 19:40:26.184358 1468 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 19:40:26.182000 audit[1468]: AVC avc: denied { mac_admin } for pid=1468 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:26.182000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 19:40:26.182000 audit[1468]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a4c5e0 a1=c00064fce0 a2=c000a13a70 a3=25 items=0 ppid=1 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.182000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 19:40:26.184991 kubelet[1468]: I0317 19:40:26.184962 1468 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Mar 17 19:40:26.187471 kubelet[1468]: I0317 19:40:26.187281 1468 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 19:40:26.191971 kubelet[1468]: I0317 19:40:26.191906 1468 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 19:40:26.193904 kubelet[1468]: I0317 19:40:26.193758 1468 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 19:40:26.194381 kubelet[1468]: I0317 19:40:26.194328 1468 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 19:40:26.195110 kubelet[1468]: I0317 19:40:26.195089 1468 server.go:455] "Adding debug handlers to kubelet server" Mar 17 19:40:26.200571 kubelet[1468]: E0317 19:40:26.200548 1468 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 19:40:26.202861 kubelet[1468]: I0317 19:40:26.202847 1468 volume_manager.go:291] "Starting Kubelet Volume Manager" Mar 17 19:40:26.203075 kubelet[1468]: I0317 19:40:26.203061 1468 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Mar 17 19:40:26.203183 kubelet[1468]: I0317 19:40:26.203173 1468 reconciler.go:26] "Reconciler: start to sync state" Mar 17 19:40:26.214878 kubelet[1468]: I0317 19:40:26.213098 1468 factory.go:221] Registration of the systemd container factory successfully Mar 17 19:40:26.214878 kubelet[1468]: I0317 19:40:26.213339 1468 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 19:40:26.225124 kubelet[1468]: I0317 19:40:26.225067 1468 factory.go:221] Registration of the containerd container factory successfully Mar 17 19:40:26.236432 kubelet[1468]: E0317 19:40:26.236366 1468 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.209\" not found" node="172.24.4.209" Mar 17 19:40:26.247354 kubelet[1468]: I0317 19:40:26.247317 1468 cpu_manager.go:214] "Starting CPU manager" policy="none" Mar 17 19:40:26.247354 kubelet[1468]: I0317 19:40:26.247349 1468 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Mar 17 19:40:26.247511 kubelet[1468]: I0317 19:40:26.247378 1468 state_mem.go:36] "Initialized new in-memory state store" Mar 17 19:40:26.253553 kubelet[1468]: I0317 19:40:26.253526 1468 policy_none.go:49] "None policy: Start" Mar 17 19:40:26.254290 kubelet[1468]: I0317 19:40:26.254252 1468 memory_manager.go:170] "Starting memorymanager" policy="None" Mar 17 19:40:26.254334 kubelet[1468]: I0317 19:40:26.254299 1468 state_mem.go:35] "Initializing new in-memory state store" Mar 17 19:40:26.265418 systemd[1]: Created slice kubepods.slice. Mar 17 19:40:26.273172 kernel: kauditd_printk_skb: 180 callbacks suppressed Mar 17 19:40:26.273246 kernel: audit: type=1325 audit(1742240426.267:421): table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:26.267000 audit[1481]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:26.269574 systemd[1]: Created slice kubepods-burstable.slice. Mar 17 19:40:26.274004 systemd[1]: Created slice kubepods-besteffort.slice. Mar 17 19:40:26.267000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd54198310 a2=0 a3=7ffd541982fc items=0 ppid=1468 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 19:40:26.285470 kernel: audit: type=1300 audit(1742240426.267:421): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd54198310 a2=0 a3=7ffd541982fc items=0 ppid=1468 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.285529 kernel: audit: type=1327 audit(1742240426.267:421): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 19:40:26.285562 kernel: audit: type=1325 audit(1742240426.273:422): table=filter:3 family=2 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:26.273000 audit[1485]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:26.273000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffdc5001100 a2=0 a3=7ffdc50010ec items=0 ppid=1468 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.296471 kernel: audit: type=1300 audit(1742240426.273:422): arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffdc5001100 a2=0 a3=7ffdc50010ec items=0 ppid=1468 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.296533 kernel: audit: type=1327 audit(1742240426.273:422): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 19:40:26.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 19:40:26.301844 kubelet[1468]: I0317 19:40:26.301795 1468 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 19:40:26.304604 kubelet[1468]: I0317 19:40:26.304151 1468 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 19:40:26.304604 kubelet[1468]: I0317 19:40:26.304280 1468 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 19:40:26.304604 kubelet[1468]: I0317 19:40:26.304413 1468 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 19:40:26.304604 kubelet[1468]: I0317 19:40:26.303692 1468 kubelet_node_status.go:73] "Attempting to register node" node="172.24.4.209" Mar 17 19:40:26.303000 audit[1468]: AVC avc: denied { mac_admin } for pid=1468 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:26.310850 kernel: audit: type=1400 audit(1742240426.303:423): avc: denied { mac_admin } for pid=1468 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:26.303000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 19:40:26.314225 kubelet[1468]: I0317 19:40:26.314201 1468 kubelet_node_status.go:76] "Successfully registered node" node="172.24.4.209" Mar 17 19:40:26.314760 kubelet[1468]: E0317 19:40:26.314727 1468 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.209\" not found" Mar 17 19:40:26.303000 audit[1468]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cb8600 a1=c000cc0138 a2=c000cb85d0 a3=25 items=0 ppid=1 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.322142 kernel: audit: type=1401 audit(1742240426.303:423): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 19:40:26.322231 kernel: audit: type=1300 audit(1742240426.303:423): arch=c000003e syscall=188 success=no exit=-22 a0=c000cb8600 a1=c000cc0138 a2=c000cb85d0 a3=25 items=0 ppid=1 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.322276 kernel: audit: type=1327 audit(1742240426.303:423): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 19:40:26.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 19:40:26.273000 audit[1487]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:26.273000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd34e75b30 a2=0 a3=7ffd34e75b1c items=0 ppid=1468 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 19:40:26.342000 audit[1492]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:26.342000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdeaafa6e0 a2=0 a3=7ffdeaafa6cc items=0 ppid=1468 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 19:40:26.345923 kubelet[1468]: E0317 19:40:26.345902 1468 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.209\" not found" Mar 17 19:40:26.409000 audit[1497]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1497 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:26.409000 audit[1497]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff3fcec8f0 a2=0 a3=7fff3fcec8dc items=0 ppid=1468 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Mar 17 19:40:26.411036 kubelet[1468]: I0317 19:40:26.410518 1468 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 19:40:26.410000 audit[1498]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:26.410000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdaa287780 a2=0 a3=7ffdaa28776c items=0 ppid=1468 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 19:40:26.412084 kubelet[1468]: I0317 19:40:26.412037 1468 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 19:40:26.412263 kubelet[1468]: I0317 19:40:26.412239 1468 status_manager.go:217] "Starting to sync pod status with apiserver" Mar 17 19:40:26.411000 audit[1499]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1499 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:26.411000 audit[1499]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1ef40cc0 a2=0 a3=7ffc1ef40cac items=0 ppid=1468 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 19:40:26.412780 kubelet[1468]: I0317 19:40:26.412753 1468 kubelet.go:2337] "Starting kubelet main sync loop" Mar 17 19:40:26.412000 audit[1500]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:26.412000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff855c2e30 a2=0 a3=7fff855c2e1c items=0 ppid=1468 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 19:40:26.413587 kubelet[1468]: E0317 19:40:26.413112 1468 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Mar 17 19:40:26.413000 audit[1501]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1501 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:26.413000 audit[1501]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4e47ebe0 a2=0 a3=7ffd4e47ebcc items=0 ppid=1468 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 19:40:26.414000 audit[1502]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:26.414000 audit[1502]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff18527500 a2=0 a3=7fff185274ec items=0 ppid=1468 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 19:40:26.414000 audit[1503]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1503 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:26.414000 audit[1503]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffec8adf7d0 a2=0 a3=7ffec8adf7bc items=0 ppid=1468 pid=1503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 19:40:26.415000 audit[1504]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1504 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:26.415000 audit[1504]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdc85101d0 a2=0 a3=7ffdc85101bc items=0 ppid=1468 pid=1504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:26.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 19:40:26.446838 kubelet[1468]: E0317 19:40:26.446792 1468 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.209\" not found" Mar 17 19:40:26.547273 kubelet[1468]: E0317 19:40:26.547174 1468 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.209\" not found" Mar 17 19:40:26.648446 kubelet[1468]: E0317 19:40:26.648262 1468 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.209\" not found" Mar 17 19:40:26.713340 sudo[1334]: pam_unix(sudo:session): session closed for user root Mar 17 19:40:26.713000 audit[1334]: USER_END pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:40:26.713000 audit[1334]: CRED_DISP pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:40:26.748909 kubelet[1468]: E0317 19:40:26.748851 1468 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.209\" not found" Mar 17 19:40:26.850264 kubelet[1468]: E0317 19:40:26.850194 1468 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.209\" not found" Mar 17 19:40:26.951537 kubelet[1468]: E0317 19:40:26.951359 1468 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.209\" not found" Mar 17 19:40:27.012225 sshd[1330]: pam_unix(sshd:session): session closed for user core Mar 17 19:40:27.013000 audit[1330]: USER_END pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Mar 17 19:40:27.013000 audit[1330]: CRED_DISP pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Mar 17 19:40:27.017382 systemd-logind[1150]: Session 9 logged out. Waiting for processes to exit. Mar 17 19:40:27.018647 systemd[1]: sshd@8-172.24.4.209:22-172.24.4.1:54674.service: Deactivated successfully. Mar 17 19:40:27.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.209:22-172.24.4.1:54674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:40:27.020087 systemd[1]: session-9.scope: Deactivated successfully. Mar 17 19:40:27.020333 systemd[1]: session-9.scope: Consumed 1.147s CPU time. Mar 17 19:40:27.021908 systemd-logind[1150]: Removed session 9. Mar 17 19:40:27.052264 kubelet[1468]: E0317 19:40:27.052206 1468 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.24.4.209\" not found" Mar 17 19:40:27.086589 kubelet[1468]: I0317 19:40:27.086554 1468 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Mar 17 19:40:27.087451 kubelet[1468]: W0317 19:40:27.087404 1468 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Node ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 19:40:27.087571 kubelet[1468]: W0317 19:40:27.087481 1468 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 19:40:27.087729 kubelet[1468]: W0317 19:40:27.087696 1468 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 19:40:27.154034 kubelet[1468]: I0317 19:40:27.153928 1468 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Mar 17 19:40:27.154437 env[1158]: time="2025-03-17T19:40:27.154367616Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Mar 17 19:40:27.155314 kubelet[1468]: I0317 19:40:27.155205 1468 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Mar 17 19:40:27.157470 kubelet[1468]: E0317 19:40:27.157398 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:27.158632 kubelet[1468]: I0317 19:40:27.158585 1468 apiserver.go:52] "Watching apiserver" Mar 17 19:40:27.178845 kubelet[1468]: I0317 19:40:27.178730 1468 topology_manager.go:215] "Topology Admit Handler" podUID="6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74" podNamespace="calico-system" podName="calico-node-d2mmp" Mar 17 19:40:27.178975 kubelet[1468]: I0317 19:40:27.178940 1468 topology_manager.go:215] "Topology Admit Handler" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" podNamespace="calico-system" podName="csi-node-driver-tttv8" Mar 17 19:40:27.179102 kubelet[1468]: I0317 19:40:27.179072 1468 topology_manager.go:215] "Topology Admit Handler" podUID="73a1d3a0-2571-4148-ad1a-caaeca28f0a8" podNamespace="kube-system" podName="kube-proxy-ltwx2" Mar 17 19:40:27.180848 kubelet[1468]: E0317 19:40:27.180755 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tttv8" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" Mar 17 19:40:27.192070 systemd[1]: Created slice kubepods-besteffort-pod73a1d3a0_2571_4148_ad1a_caaeca28f0a8.slice. Mar 17 19:40:27.215412 kubelet[1468]: I0317 19:40:27.212371 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-cni-bin-dir\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.215730 kubelet[1468]: I0317 19:40:27.215689 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-cni-log-dir\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.215993 kubelet[1468]: I0317 19:40:27.215956 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c-socket-dir\") pod \"csi-node-driver-tttv8\" (UID: \"e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c\") " pod="calico-system/csi-node-driver-tttv8" Mar 17 19:40:27.216197 kubelet[1468]: I0317 19:40:27.216159 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c-registration-dir\") pod \"csi-node-driver-tttv8\" (UID: \"e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c\") " pod="calico-system/csi-node-driver-tttv8" Mar 17 19:40:27.216381 kubelet[1468]: I0317 19:40:27.216347 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/73a1d3a0-2571-4148-ad1a-caaeca28f0a8-kube-proxy\") pod \"kube-proxy-ltwx2\" (UID: \"73a1d3a0-2571-4148-ad1a-caaeca28f0a8\") " pod="kube-system/kube-proxy-ltwx2" Mar 17 19:40:27.218193 kubelet[1468]: I0317 19:40:27.218105 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-policysync\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.218323 kubelet[1468]: I0317 19:40:27.218204 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-tigera-ca-bundle\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.218323 kubelet[1468]: I0317 19:40:27.218250 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-node-certs\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.218323 kubelet[1468]: I0317 19:40:27.218292 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c-varrun\") pod \"csi-node-driver-tttv8\" (UID: \"e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c\") " pod="calico-system/csi-node-driver-tttv8" Mar 17 19:40:27.218529 kubelet[1468]: I0317 19:40:27.218333 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c-kubelet-dir\") pod \"csi-node-driver-tttv8\" (UID: \"e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c\") " pod="calico-system/csi-node-driver-tttv8" Mar 17 19:40:27.218529 kubelet[1468]: I0317 19:40:27.218375 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/73a1d3a0-2571-4148-ad1a-caaeca28f0a8-xtables-lock\") pod \"kube-proxy-ltwx2\" (UID: \"73a1d3a0-2571-4148-ad1a-caaeca28f0a8\") " pod="kube-system/kube-proxy-ltwx2" Mar 17 19:40:27.218529 kubelet[1468]: I0317 19:40:27.218420 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-var-lib-calico\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.218529 kubelet[1468]: I0317 19:40:27.218461 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l2t9g\" (UniqueName: \"kubernetes.io/projected/e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c-kube-api-access-l2t9g\") pod \"csi-node-driver-tttv8\" (UID: \"e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c\") " pod="calico-system/csi-node-driver-tttv8" Mar 17 19:40:27.218529 kubelet[1468]: I0317 19:40:27.218505 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-xtables-lock\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.218914 kubelet[1468]: I0317 19:40:27.218546 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-var-run-calico\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.218914 kubelet[1468]: I0317 19:40:27.218584 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-cni-net-dir\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.218914 kubelet[1468]: I0317 19:40:27.218620 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/73a1d3a0-2571-4148-ad1a-caaeca28f0a8-lib-modules\") pod \"kube-proxy-ltwx2\" (UID: \"73a1d3a0-2571-4148-ad1a-caaeca28f0a8\") " pod="kube-system/kube-proxy-ltwx2" Mar 17 19:40:27.218914 kubelet[1468]: I0317 19:40:27.218657 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-txlph\" (UniqueName: \"kubernetes.io/projected/73a1d3a0-2571-4148-ad1a-caaeca28f0a8-kube-api-access-txlph\") pod \"kube-proxy-ltwx2\" (UID: \"73a1d3a0-2571-4148-ad1a-caaeca28f0a8\") " pod="kube-system/kube-proxy-ltwx2" Mar 17 19:40:27.218914 kubelet[1468]: I0317 19:40:27.218694 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-lib-modules\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.219744 kubelet[1468]: I0317 19:40:27.213434 1468 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Mar 17 19:40:27.224128 systemd[1]: Created slice kubepods-besteffort-pod6e1abcb5_aa4b_41bb_be42_7aad6dbb6b74.slice. Mar 17 19:40:27.320106 kubelet[1468]: I0317 19:40:27.320057 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gskc5\" (UniqueName: \"kubernetes.io/projected/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-kube-api-access-gskc5\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.320716 kubelet[1468]: I0317 19:40:27.320597 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74-flexvol-driver-host\") pod \"calico-node-d2mmp\" (UID: \"6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74\") " pod="calico-system/calico-node-d2mmp" Mar 17 19:40:27.453559 kubelet[1468]: E0317 19:40:27.453520 1468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:40:27.453795 kubelet[1468]: W0317 19:40:27.453765 1468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:40:27.454057 kubelet[1468]: E0317 19:40:27.454027 1468 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:40:27.529716 env[1158]: time="2025-03-17T19:40:27.520763454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ltwx2,Uid:73a1d3a0-2571-4148-ad1a-caaeca28f0a8,Namespace:kube-system,Attempt:0,}" Mar 17 19:40:27.534806 env[1158]: time="2025-03-17T19:40:27.534517035Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d2mmp,Uid:6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74,Namespace:calico-system,Attempt:0,}" Mar 17 19:40:28.158320 kubelet[1468]: E0317 19:40:28.158179 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:28.718038 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1557717818.mount: Deactivated successfully. Mar 17 19:40:28.733151 env[1158]: time="2025-03-17T19:40:28.733047455Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:28.738978 env[1158]: time="2025-03-17T19:40:28.738672556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:28.745999 env[1158]: time="2025-03-17T19:40:28.744902845Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:28.756380 env[1158]: time="2025-03-17T19:40:28.752568379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:28.757223 env[1158]: time="2025-03-17T19:40:28.757133574Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:28.760969 env[1158]: time="2025-03-17T19:40:28.760876956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:28.765145 env[1158]: time="2025-03-17T19:40:28.765056586Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:28.772519 env[1158]: time="2025-03-17T19:40:28.772461314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:28.814938 env[1158]: time="2025-03-17T19:40:28.814192382Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:40:28.814938 env[1158]: time="2025-03-17T19:40:28.814259078Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:40:28.814938 env[1158]: time="2025-03-17T19:40:28.814273232Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:40:28.814938 env[1158]: time="2025-03-17T19:40:28.814437690Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/13b62166acfa83de9ddb7f0905f71a56b752806811a7933fec380e6b81f2ca9b pid=1520 runtime=io.containerd.runc.v2 Mar 17 19:40:28.826112 env[1158]: time="2025-03-17T19:40:28.826036725Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:40:28.826303 env[1158]: time="2025-03-17T19:40:28.826279186Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:40:28.826418 env[1158]: time="2025-03-17T19:40:28.826395925Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:40:28.829308 env[1158]: time="2025-03-17T19:40:28.829221842Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8fa566862e2db2125caf111c8c9ee405b7455bcb737c74e6f7f8e49dadfbb7c0 pid=1538 runtime=io.containerd.runc.v2 Mar 17 19:40:28.848967 systemd[1]: Started cri-containerd-8fa566862e2db2125caf111c8c9ee405b7455bcb737c74e6f7f8e49dadfbb7c0.scope. Mar 17 19:40:28.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.864000 audit: BPF prog-id=61 op=LOAD Mar 17 19:40:28.864000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.864000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1538 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:28.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866613536363836326532646232313235636166313131633863396565 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1538 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:28.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866613536363836326532646232313235636166313131633863396565 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit: BPF prog-id=62 op=LOAD Mar 17 19:40:28.865000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000305da0 items=0 ppid=1538 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:28.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866613536363836326532646232313235636166313131633863396565 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.865000 audit: BPF prog-id=63 op=LOAD Mar 17 19:40:28.865000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000305de8 items=0 ppid=1538 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:28.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866613536363836326532646232313235636166313131633863396565 Mar 17 19:40:28.866000 audit: BPF prog-id=63 op=UNLOAD Mar 17 19:40:28.866000 audit: BPF prog-id=62 op=UNLOAD Mar 17 19:40:28.866000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.866000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.866000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.866000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.866000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.866000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.866000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.866000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.866000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.866000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.866000 audit: BPF prog-id=64 op=LOAD Mar 17 19:40:28.866000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003981f8 items=0 ppid=1538 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:28.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866613536363836326532646232313235636166313131633863396565 Mar 17 19:40:28.871278 systemd[1]: Started cri-containerd-13b62166acfa83de9ddb7f0905f71a56b752806811a7933fec380e6b81f2ca9b.scope. Mar 17 19:40:28.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.889000 audit: BPF prog-id=65 op=LOAD Mar 17 19:40:28.890000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.890000 audit[1555]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1520 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:28.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623632313636616366613833646539646462376630393035663731 Mar 17 19:40:28.890000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.890000 audit[1555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1520 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:28.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623632313636616366613833646539646462376630393035663731 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit: BPF prog-id=66 op=LOAD Mar 17 19:40:28.891000 audit[1555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002198c0 items=0 ppid=1520 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:28.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623632313636616366613833646539646462376630393035663731 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.891000 audit: BPF prog-id=67 op=LOAD Mar 17 19:40:28.891000 audit[1555]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219908 items=0 ppid=1520 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:28.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623632313636616366613833646539646462376630393035663731 Mar 17 19:40:28.892000 audit: BPF prog-id=67 op=UNLOAD Mar 17 19:40:28.892000 audit: BPF prog-id=66 op=UNLOAD Mar 17 19:40:28.892000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.892000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.892000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.892000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.892000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.892000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.892000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.892000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.892000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.892000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:28.892000 audit: BPF prog-id=68 op=LOAD Mar 17 19:40:28.892000 audit[1555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219d18 items=0 ppid=1520 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:28.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623632313636616366613833646539646462376630393035663731 Mar 17 19:40:28.896444 env[1158]: time="2025-03-17T19:40:28.896381806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d2mmp,Uid:6e1abcb5-aa4b-41bb-be42-7aad6dbb6b74,Namespace:calico-system,Attempt:0,} returns sandbox id \"8fa566862e2db2125caf111c8c9ee405b7455bcb737c74e6f7f8e49dadfbb7c0\"" Mar 17 19:40:28.902405 env[1158]: time="2025-03-17T19:40:28.902371921Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Mar 17 19:40:28.911022 env[1158]: time="2025-03-17T19:40:28.910964621Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ltwx2,Uid:73a1d3a0-2571-4148-ad1a-caaeca28f0a8,Namespace:kube-system,Attempt:0,} returns sandbox id \"13b62166acfa83de9ddb7f0905f71a56b752806811a7933fec380e6b81f2ca9b\"" Mar 17 19:40:29.159312 kubelet[1468]: E0317 19:40:29.159245 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:29.414636 kubelet[1468]: E0317 19:40:29.414376 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tttv8" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" Mar 17 19:40:30.159976 kubelet[1468]: E0317 19:40:30.159910 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:31.089055 update_engine[1151]: I0317 19:40:31.087939 1151 update_attempter.cc:509] Updating boot flags... Mar 17 19:40:31.161738 kubelet[1468]: E0317 19:40:31.160318 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:31.413931 kubelet[1468]: E0317 19:40:31.413730 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tttv8" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" Mar 17 19:40:31.665785 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2045387093.mount: Deactivated successfully. Mar 17 19:40:31.860204 env[1158]: time="2025-03-17T19:40:31.860163767Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:31.864287 env[1158]: time="2025-03-17T19:40:31.864261712Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:31.869263 env[1158]: time="2025-03-17T19:40:31.869240236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:31.872202 env[1158]: time="2025-03-17T19:40:31.872179173Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:31.873192 env[1158]: time="2025-03-17T19:40:31.873165481Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Mar 17 19:40:31.877619 env[1158]: time="2025-03-17T19:40:31.876628542Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.11\"" Mar 17 19:40:31.878172 env[1158]: time="2025-03-17T19:40:31.878145709Z" level=info msg="CreateContainer within sandbox \"8fa566862e2db2125caf111c8c9ee405b7455bcb737c74e6f7f8e49dadfbb7c0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 19:40:31.900181 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount842152274.mount: Deactivated successfully. Mar 17 19:40:31.912949 env[1158]: time="2025-03-17T19:40:31.912892837Z" level=info msg="CreateContainer within sandbox \"8fa566862e2db2125caf111c8c9ee405b7455bcb737c74e6f7f8e49dadfbb7c0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"477e2101c2e7c11923e7ec2542686d13f94ec836df61c35742bc2d2706e7d453\"" Mar 17 19:40:31.914121 env[1158]: time="2025-03-17T19:40:31.914097522Z" level=info msg="StartContainer for \"477e2101c2e7c11923e7ec2542686d13f94ec836df61c35742bc2d2706e7d453\"" Mar 17 19:40:31.951559 systemd[1]: Started cri-containerd-477e2101c2e7c11923e7ec2542686d13f94ec836df61c35742bc2d2706e7d453.scope. Mar 17 19:40:31.978000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.982591 kernel: kauditd_printk_skb: 149 callbacks suppressed Mar 17 19:40:31.982644 kernel: audit: type=1400 audit(1742240431.978:475): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.978000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f04102ee7a8 items=0 ppid=1538 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:31.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437376532313031633265376331313932336537656332353432363836 Mar 17 19:40:32.005143 kernel: audit: type=1300 audit(1742240431.978:475): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f04102ee7a8 items=0 ppid=1538 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:32.005206 kernel: audit: type=1327 audit(1742240431.978:475): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437376532313031633265376331313932336537656332353432363836 Mar 17 19:40:32.005237 kernel: audit: type=1400 audit(1742240431.979:476): avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.979000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:32.010020 kernel: audit: type=1400 audit(1742240431.979:476): avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.979000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:32.014711 kernel: audit: type=1400 audit(1742240431.979:476): avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.979000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:32.019456 kernel: audit: type=1400 audit(1742240431.979:476): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.979000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.979000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:32.029470 kernel: audit: type=1400 audit(1742240431.979:476): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:32.029572 kernel: audit: type=1400 audit(1742240431.979:476): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.979000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.979000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:32.042876 kernel: audit: type=1400 audit(1742240431.979:476): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.979000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.979000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.979000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.979000 audit: BPF prog-id=69 op=LOAD Mar 17 19:40:31.979000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000311ee8 items=0 ppid=1538 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:31.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437376532313031633265376331313932336537656332353432363836 Mar 17 19:40:31.988000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.988000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.988000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.988000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.988000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.988000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.988000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.988000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.988000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.988000 audit: BPF prog-id=70 op=LOAD Mar 17 19:40:31.988000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000311f38 items=0 ppid=1538 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:31.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437376532313031633265376331313932336537656332353432363836 Mar 17 19:40:31.995000 audit: BPF prog-id=70 op=UNLOAD Mar 17 19:40:31.995000 audit: BPF prog-id=69 op=UNLOAD Mar 17 19:40:31.995000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.995000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.995000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.995000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.995000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.995000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.995000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.995000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.995000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.995000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:31.995000 audit: BPF prog-id=71 op=LOAD Mar 17 19:40:31.995000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000311fc8 items=0 ppid=1538 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:31.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437376532313031633265376331313932336537656332353432363836 Mar 17 19:40:32.056695 env[1158]: time="2025-03-17T19:40:32.056590546Z" level=info msg="StartContainer for \"477e2101c2e7c11923e7ec2542686d13f94ec836df61c35742bc2d2706e7d453\" returns successfully" Mar 17 19:40:32.063471 systemd[1]: cri-containerd-477e2101c2e7c11923e7ec2542686d13f94ec836df61c35742bc2d2706e7d453.scope: Deactivated successfully. Mar 17 19:40:32.066000 audit: BPF prog-id=71 op=UNLOAD Mar 17 19:40:32.161245 kubelet[1468]: E0317 19:40:32.161038 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:32.237907 env[1158]: time="2025-03-17T19:40:32.235480620Z" level=info msg="shim disconnected" id=477e2101c2e7c11923e7ec2542686d13f94ec836df61c35742bc2d2706e7d453 Mar 17 19:40:32.237907 env[1158]: time="2025-03-17T19:40:32.235569538Z" level=warning msg="cleaning up after shim disconnected" id=477e2101c2e7c11923e7ec2542686d13f94ec836df61c35742bc2d2706e7d453 namespace=k8s.io Mar 17 19:40:32.237907 env[1158]: time="2025-03-17T19:40:32.235592462Z" level=info msg="cleaning up dead shim" Mar 17 19:40:32.262298 env[1158]: time="2025-03-17T19:40:32.262191189Z" level=warning msg="cleanup warnings time=\"2025-03-17T19:40:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1656 runtime=io.containerd.runc.v2\n" Mar 17 19:40:32.562858 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-477e2101c2e7c11923e7ec2542686d13f94ec836df61c35742bc2d2706e7d453-rootfs.mount: Deactivated successfully. Mar 17 19:40:33.161958 kubelet[1468]: E0317 19:40:33.161897 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:33.414292 kubelet[1468]: E0317 19:40:33.413938 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tttv8" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" Mar 17 19:40:33.889456 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3610217074.mount: Deactivated successfully. Mar 17 19:40:34.162827 kubelet[1468]: E0317 19:40:34.162647 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:34.775031 env[1158]: time="2025-03-17T19:40:34.774949210Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:34.778654 env[1158]: time="2025-03-17T19:40:34.778628261Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01045f200a8856c3f5ccfa7be03d72274f1f16fc7a047659e709d603d5c019dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:34.782547 env[1158]: time="2025-03-17T19:40:34.782523547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:34.793266 env[1158]: time="2025-03-17T19:40:34.793218941Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea4da798040a18ed3f302e8d5f67307c7275a2a53bcf3d51bcec223acda84a55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:34.793738 env[1158]: time="2025-03-17T19:40:34.793710994Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.11\" returns image reference \"sha256:01045f200a8856c3f5ccfa7be03d72274f1f16fc7a047659e709d603d5c019dc\"" Mar 17 19:40:34.796619 env[1158]: time="2025-03-17T19:40:34.796591212Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Mar 17 19:40:34.799606 env[1158]: time="2025-03-17T19:40:34.799567418Z" level=info msg="CreateContainer within sandbox \"13b62166acfa83de9ddb7f0905f71a56b752806811a7933fec380e6b81f2ca9b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Mar 17 19:40:34.812241 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2602732489.mount: Deactivated successfully. Mar 17 19:40:34.817203 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount819099142.mount: Deactivated successfully. Mar 17 19:40:34.829426 env[1158]: time="2025-03-17T19:40:34.829341000Z" level=info msg="CreateContainer within sandbox \"13b62166acfa83de9ddb7f0905f71a56b752806811a7933fec380e6b81f2ca9b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2035312aa1fe65bebc3a4e2a608643ea350b548a2647d15cf40700f7fd8e904f\"" Mar 17 19:40:34.830675 env[1158]: time="2025-03-17T19:40:34.830639475Z" level=info msg="StartContainer for \"2035312aa1fe65bebc3a4e2a608643ea350b548a2647d15cf40700f7fd8e904f\"" Mar 17 19:40:34.866871 systemd[1]: Started cri-containerd-2035312aa1fe65bebc3a4e2a608643ea350b548a2647d15cf40700f7fd8e904f.scope. Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb37c83fa48 items=0 ppid=1520 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:34.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333533313261613166653635626562633361346532613630383634 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit: BPF prog-id=72 op=LOAD Mar 17 19:40:34.898000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00039c3e8 items=0 ppid=1520 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:34.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333533313261613166653635626562633361346532613630383634 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit: BPF prog-id=73 op=LOAD Mar 17 19:40:34.898000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00039c438 items=0 ppid=1520 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:34.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333533313261613166653635626562633361346532613630383634 Mar 17 19:40:34.898000 audit: BPF prog-id=73 op=UNLOAD Mar 17 19:40:34.898000 audit: BPF prog-id=72 op=UNLOAD Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { perfmon } for pid=1681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit[1681]: AVC avc: denied { bpf } for pid=1681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:34.898000 audit: BPF prog-id=74 op=LOAD Mar 17 19:40:34.898000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00039c4c8 items=0 ppid=1520 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:34.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230333533313261613166653635626562633361346532613630383634 Mar 17 19:40:34.924776 env[1158]: time="2025-03-17T19:40:34.924723629Z" level=info msg="StartContainer for \"2035312aa1fe65bebc3a4e2a608643ea350b548a2647d15cf40700f7fd8e904f\" returns successfully" Mar 17 19:40:35.025000 audit[1734]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.025000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee4b4b9a0 a2=0 a3=7ffee4b4b98c items=0 ppid=1692 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 19:40:35.028000 audit[1735]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.028000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd897ed340 a2=0 a3=7ffd897ed32c items=0 ppid=1692 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 19:40:35.029000 audit[1737]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.029000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff00143c10 a2=0 a3=7fff00143bfc items=0 ppid=1692 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 19:40:35.031000 audit[1736]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.031000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3ce766c0 a2=0 a3=7ffc3ce766ac items=0 ppid=1692 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 19:40:35.034000 audit[1738]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.034000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2cce09a0 a2=0 a3=7fff2cce098c items=0 ppid=1692 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 19:40:35.037000 audit[1739]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.037000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2a1a5b80 a2=0 a3=7fff2a1a5b6c items=0 ppid=1692 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 19:40:35.135000 audit[1740]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.135000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdf4c5d580 a2=0 a3=7ffdf4c5d56c items=0 ppid=1692 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.135000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 19:40:35.141000 audit[1742]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.141000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff891cf6b0 a2=0 a3=7fff891cf69c items=0 ppid=1692 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Mar 17 19:40:35.149000 audit[1745]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.149000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd66a353a0 a2=0 a3=7ffd66a3538c items=0 ppid=1692 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Mar 17 19:40:35.152000 audit[1746]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.152000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb60db280 a2=0 a3=7fffb60db26c items=0 ppid=1692 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 19:40:35.158000 audit[1748]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.158000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda9a7ed50 a2=0 a3=7ffda9a7ed3c items=0 ppid=1692 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.158000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 19:40:35.161000 audit[1749]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.161000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb891c850 a2=0 a3=7ffcb891c83c items=0 ppid=1692 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 19:40:35.163697 kubelet[1468]: E0317 19:40:35.163640 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:35.168000 audit[1751]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.168000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcfb7207a0 a2=0 a3=7ffcfb72078c items=0 ppid=1692 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 19:40:35.176000 audit[1754]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.176000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc8edff130 a2=0 a3=7ffc8edff11c items=0 ppid=1692 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Mar 17 19:40:35.179000 audit[1755]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.179000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc20190a60 a2=0 a3=7ffc20190a4c items=0 ppid=1692 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 19:40:35.186000 audit[1757]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.186000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd4762b40 a2=0 a3=7ffdd4762b2c items=0 ppid=1692 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 19:40:35.189000 audit[1758]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.189000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe34e7db50 a2=0 a3=7ffe34e7db3c items=0 ppid=1692 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 19:40:35.195000 audit[1760]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.195000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0ff0acf0 a2=0 a3=7ffc0ff0acdc items=0 ppid=1692 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 19:40:35.204000 audit[1763]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.204000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4c291b60 a2=0 a3=7ffe4c291b4c items=0 ppid=1692 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 19:40:35.210000 audit[1766]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.210000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdb75bb90 a2=0 a3=7fffdb75bb7c items=0 ppid=1692 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 19:40:35.212000 audit[1767]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.212000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc32a6b90 a2=0 a3=7ffcc32a6b7c items=0 ppid=1692 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 19:40:35.214000 audit[1769]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.214000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe291bfa30 a2=0 a3=7ffe291bfa1c items=0 ppid=1692 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 19:40:35.241000 audit[1775]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.241000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe480760e0 a2=0 a3=7ffe480760cc items=0 ppid=1692 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.241000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 19:40:35.244000 audit[1776]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.244000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4a6867e0 a2=0 a3=7ffc4a6867cc items=0 ppid=1692 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 19:40:35.247000 audit[1778]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:40:35.247000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff623df230 a2=0 a3=7fff623df21c items=0 ppid=1692 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 19:40:35.260000 audit[1784]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:40:35.260000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe9d40ccc0 a2=0 a3=7ffe9d40ccac items=0 ppid=1692 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:40:35.293000 audit[1784]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:40:35.293000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffe9d40ccc0 a2=0 a3=7ffe9d40ccac items=0 ppid=1692 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.293000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:40:35.312000 audit[1792]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.312000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffed545cc00 a2=0 a3=7ffed545cbec items=0 ppid=1692 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 19:40:35.317000 audit[1794]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.317000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc14a5d530 a2=0 a3=7ffc14a5d51c items=0 ppid=1692 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Mar 17 19:40:35.322000 audit[1797]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.322000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe7e1bef20 a2=0 a3=7ffe7e1bef0c items=0 ppid=1692 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Mar 17 19:40:35.323000 audit[1798]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.323000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebb3f9c00 a2=0 a3=7ffebb3f9bec items=0 ppid=1692 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 19:40:35.327000 audit[1800]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.327000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff3d664dd0 a2=0 a3=7fff3d664dbc items=0 ppid=1692 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 19:40:35.330000 audit[1801]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.330000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb78e2c50 a2=0 a3=7ffdb78e2c3c items=0 ppid=1692 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 19:40:35.336000 audit[1803]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.336000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcb2f7a5a0 a2=0 a3=7ffcb2f7a58c items=0 ppid=1692 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Mar 17 19:40:35.343000 audit[1806]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.343000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc05d11930 a2=0 a3=7ffc05d1191c items=0 ppid=1692 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 19:40:35.344000 audit[1807]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.344000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea0377aa0 a2=0 a3=7ffea0377a8c items=0 ppid=1692 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 19:40:35.347000 audit[1809]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.347000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0c070170 a2=0 a3=7fff0c07015c items=0 ppid=1692 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.347000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 19:40:35.349000 audit[1810]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.349000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0fca8c50 a2=0 a3=7ffe0fca8c3c items=0 ppid=1692 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 19:40:35.353000 audit[1812]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.353000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc368ab140 a2=0 a3=7ffc368ab12c items=0 ppid=1692 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 19:40:35.358000 audit[1815]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.358000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6008c6d0 a2=0 a3=7ffc6008c6bc items=0 ppid=1692 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 19:40:35.364000 audit[1818]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.364000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde585af70 a2=0 a3=7ffde585af5c items=0 ppid=1692 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.364000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Mar 17 19:40:35.366000 audit[1819]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.366000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffddae3830 a2=0 a3=7fffddae381c items=0 ppid=1692 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.366000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 19:40:35.368000 audit[1821]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.368000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc88fbc200 a2=0 a3=7ffc88fbc1ec items=0 ppid=1692 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 19:40:35.372000 audit[1824]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.372000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffedca64b80 a2=0 a3=7ffedca64b6c items=0 ppid=1692 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 19:40:35.373000 audit[1825]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.373000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3b4dbcb0 a2=0 a3=7ffe3b4dbc9c items=0 ppid=1692 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 19:40:35.377000 audit[1827]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.377000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff3c14b730 a2=0 a3=7fff3c14b71c items=0 ppid=1692 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 19:40:35.379000 audit[1828]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.379000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd25f32ee0 a2=0 a3=7ffd25f32ecc items=0 ppid=1692 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 19:40:35.382000 audit[1830]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.382000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc72cf69d0 a2=0 a3=7ffc72cf69bc items=0 ppid=1692 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 19:40:35.386000 audit[1833]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:40:35.386000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef5c3b8a0 a2=0 a3=7ffef5c3b88c items=0 ppid=1692 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 19:40:35.389000 audit[1835]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 19:40:35.389000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd90d10750 a2=0 a3=7ffd90d1073c items=0 ppid=1692 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.389000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:40:35.389000 audit[1835]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 19:40:35.389000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd90d10750 a2=0 a3=7ffd90d1073c items=0 ppid=1692 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:35.389000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:40:35.414631 kubelet[1468]: E0317 19:40:35.413868 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tttv8" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" Mar 17 19:40:35.496545 kubelet[1468]: I0317 19:40:35.496410 1468 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-ltwx2" podStartSLOduration=3.6133026040000003 podStartE2EDuration="9.49636796s" podCreationTimestamp="2025-03-17 19:40:26 +0000 UTC" firstStartedPulling="2025-03-17 19:40:28.912706986 +0000 UTC m=+3.893582581" lastFinishedPulling="2025-03-17 19:40:34.795772341 +0000 UTC m=+9.776647937" observedRunningTime="2025-03-17 19:40:35.494649319 +0000 UTC m=+10.475524964" watchObservedRunningTime="2025-03-17 19:40:35.49636796 +0000 UTC m=+10.477243605" Mar 17 19:40:36.165506 kubelet[1468]: E0317 19:40:36.165414 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:37.167141 kubelet[1468]: E0317 19:40:37.167042 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:37.414081 kubelet[1468]: E0317 19:40:37.413750 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tttv8" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" Mar 17 19:40:38.168509 kubelet[1468]: E0317 19:40:38.168221 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:39.168802 kubelet[1468]: E0317 19:40:39.168627 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:39.415945 kubelet[1468]: E0317 19:40:39.415701 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tttv8" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" Mar 17 19:40:40.168979 kubelet[1468]: E0317 19:40:40.168899 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:41.169789 kubelet[1468]: E0317 19:40:41.169610 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:41.413915 kubelet[1468]: E0317 19:40:41.413315 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tttv8" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" Mar 17 19:40:42.170291 kubelet[1468]: E0317 19:40:42.170120 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:42.716362 env[1158]: time="2025-03-17T19:40:42.716259178Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:42.720642 env[1158]: time="2025-03-17T19:40:42.720588141Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:42.724064 env[1158]: time="2025-03-17T19:40:42.724032008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:42.727046 env[1158]: time="2025-03-17T19:40:42.727025472Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:42.728567 env[1158]: time="2025-03-17T19:40:42.728497111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Mar 17 19:40:42.733581 env[1158]: time="2025-03-17T19:40:42.733519925Z" level=info msg="CreateContainer within sandbox \"8fa566862e2db2125caf111c8c9ee405b7455bcb737c74e6f7f8e49dadfbb7c0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 19:40:42.759255 env[1158]: time="2025-03-17T19:40:42.759216818Z" level=info msg="CreateContainer within sandbox \"8fa566862e2db2125caf111c8c9ee405b7455bcb737c74e6f7f8e49dadfbb7c0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5ed08128283e89c94ab11b2ca84de9831a19e2076b577c27d0f367fde3259952\"" Mar 17 19:40:42.759989 env[1158]: time="2025-03-17T19:40:42.759966577Z" level=info msg="StartContainer for \"5ed08128283e89c94ab11b2ca84de9831a19e2076b577c27d0f367fde3259952\"" Mar 17 19:40:42.763151 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2053032127.mount: Deactivated successfully. Mar 17 19:40:42.807722 systemd[1]: Started cri-containerd-5ed08128283e89c94ab11b2ca84de9831a19e2076b577c27d0f367fde3259952.scope. Mar 17 19:40:42.822230 systemd[1]: run-containerd-runc-k8s.io-5ed08128283e89c94ab11b2ca84de9831a19e2076b577c27d0f367fde3259952-runc.uMRt3Z.mount: Deactivated successfully. Mar 17 19:40:42.845604 kernel: kauditd_printk_skb: 230 callbacks suppressed Mar 17 19:40:42.845714 kernel: audit: type=1400 audit(1742240442.838:539): avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7feaccd18cc8 items=0 ppid=1538 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:42.861475 kernel: audit: type=1300 audit(1742240442.838:539): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7feaccd18cc8 items=0 ppid=1538 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:42.861533 kernel: audit: type=1327 audit(1742240442.838:539): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565643038313238323833653839633934616231316232636138346465 Mar 17 19:40:42.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565643038313238323833653839633934616231316232636138346465 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.867838 kernel: audit: type=1400 audit(1742240442.838:540): avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.878094 kernel: audit: type=1400 audit(1742240442.838:540): avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.878182 kernel: audit: type=1400 audit(1742240442.838:540): avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.890336 kernel: audit: type=1400 audit(1742240442.838:540): avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.890385 kernel: audit: type=1400 audit(1742240442.838:540): avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.890425 kernel: audit: type=1400 audit(1742240442.838:540): avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.895451 kernel: audit: type=1400 audit(1742240442.838:540): avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit: BPF prog-id=75 op=LOAD Mar 17 19:40:42.838000 audit[1843]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000304c88 items=0 ppid=1538 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:42.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565643038313238323833653839633934616231316232636138346465 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit: BPF prog-id=76 op=LOAD Mar 17 19:40:42.838000 audit[1843]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000304cd8 items=0 ppid=1538 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:42.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565643038313238323833653839633934616231316232636138346465 Mar 17 19:40:42.838000 audit: BPF prog-id=76 op=UNLOAD Mar 17 19:40:42.838000 audit: BPF prog-id=75 op=UNLOAD Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:42.838000 audit: BPF prog-id=77 op=LOAD Mar 17 19:40:42.838000 audit[1843]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000304d68 items=0 ppid=1538 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:42.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565643038313238323833653839633934616231316232636138346465 Mar 17 19:40:42.960198 env[1158]: time="2025-03-17T19:40:42.960108233Z" level=info msg="StartContainer for \"5ed08128283e89c94ab11b2ca84de9831a19e2076b577c27d0f367fde3259952\" returns successfully" Mar 17 19:40:43.172160 kubelet[1468]: E0317 19:40:43.171984 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:43.414096 kubelet[1468]: E0317 19:40:43.414000 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tttv8" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" Mar 17 19:40:44.172885 kubelet[1468]: E0317 19:40:44.172742 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:44.360135 env[1158]: time="2025-03-17T19:40:44.360022502Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 19:40:44.363748 systemd[1]: cri-containerd-5ed08128283e89c94ab11b2ca84de9831a19e2076b577c27d0f367fde3259952.scope: Deactivated successfully. Mar 17 19:40:44.364242 systemd[1]: cri-containerd-5ed08128283e89c94ab11b2ca84de9831a19e2076b577c27d0f367fde3259952.scope: Consumed 1.009s CPU time. Mar 17 19:40:44.366000 audit: BPF prog-id=77 op=UNLOAD Mar 17 19:40:44.408410 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5ed08128283e89c94ab11b2ca84de9831a19e2076b577c27d0f367fde3259952-rootfs.mount: Deactivated successfully. Mar 17 19:40:44.417366 kubelet[1468]: I0317 19:40:44.417326 1468 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Mar 17 19:40:45.173275 kubelet[1468]: E0317 19:40:45.173197 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:45.425462 systemd[1]: Created slice kubepods-besteffort-pode04e57ec_b0e3_42db_8bc5_13ea4e9ddd5c.slice. Mar 17 19:40:45.432054 env[1158]: time="2025-03-17T19:40:45.431362262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tttv8,Uid:e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c,Namespace:calico-system,Attempt:0,}" Mar 17 19:40:45.565932 env[1158]: time="2025-03-17T19:40:45.565857244Z" level=info msg="shim disconnected" id=5ed08128283e89c94ab11b2ca84de9831a19e2076b577c27d0f367fde3259952 Mar 17 19:40:45.566176 env[1158]: time="2025-03-17T19:40:45.566146143Z" level=warning msg="cleaning up after shim disconnected" id=5ed08128283e89c94ab11b2ca84de9831a19e2076b577c27d0f367fde3259952 namespace=k8s.io Mar 17 19:40:45.566309 env[1158]: time="2025-03-17T19:40:45.566285543Z" level=info msg="cleaning up dead shim" Mar 17 19:40:45.629601 env[1158]: time="2025-03-17T19:40:45.629498065Z" level=warning msg="cleanup warnings time=\"2025-03-17T19:40:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1882 runtime=io.containerd.runc.v2\n" Mar 17 19:40:45.684885 env[1158]: time="2025-03-17T19:40:45.681561920Z" level=error msg="Failed to destroy network for sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:40:45.684885 env[1158]: time="2025-03-17T19:40:45.681948292Z" level=error msg="encountered an error cleaning up failed sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:40:45.684885 env[1158]: time="2025-03-17T19:40:45.681999108Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tttv8,Uid:e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:40:45.685058 kubelet[1468]: E0317 19:40:45.682283 1468 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:40:45.685058 kubelet[1468]: E0317 19:40:45.682366 1468 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tttv8" Mar 17 19:40:45.685058 kubelet[1468]: E0317 19:40:45.682395 1468 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tttv8" Mar 17 19:40:45.685037 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e-shm.mount: Deactivated successfully. Mar 17 19:40:45.685233 kubelet[1468]: E0317 19:40:45.682445 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tttv8_calico-system(e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tttv8_calico-system(e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tttv8" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" Mar 17 19:40:46.157611 kubelet[1468]: E0317 19:40:46.157538 1468 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:46.174104 kubelet[1468]: E0317 19:40:46.174014 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:46.509023 env[1158]: time="2025-03-17T19:40:46.508769073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Mar 17 19:40:46.512118 kubelet[1468]: I0317 19:40:46.512026 1468 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:40:46.514600 env[1158]: time="2025-03-17T19:40:46.514532316Z" level=info msg="StopPodSandbox for \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\"" Mar 17 19:40:46.574369 env[1158]: time="2025-03-17T19:40:46.574274736Z" level=error msg="StopPodSandbox for \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\" failed" error="failed to destroy network for sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:40:46.574996 kubelet[1468]: E0317 19:40:46.574914 1468 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:40:46.575209 kubelet[1468]: E0317 19:40:46.575018 1468 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e"} Mar 17 19:40:46.575209 kubelet[1468]: E0317 19:40:46.575157 1468 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 19:40:46.575473 kubelet[1468]: E0317 19:40:46.575218 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tttv8" podUID="e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c" Mar 17 19:40:47.175199 kubelet[1468]: E0317 19:40:47.175099 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:48.175792 kubelet[1468]: E0317 19:40:48.175718 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:49.176195 kubelet[1468]: E0317 19:40:49.176127 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:50.177125 kubelet[1468]: E0317 19:40:50.177076 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:51.177495 kubelet[1468]: E0317 19:40:51.177410 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:52.178337 kubelet[1468]: E0317 19:40:52.178193 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:52.919654 kubelet[1468]: I0317 19:40:52.918876 1468 topology_manager.go:215] "Topology Admit Handler" podUID="68b62776-b6da-47bb-8aed-a241b87efe8a" podNamespace="default" podName="nginx-deployment-85f456d6dd-c87mw" Mar 17 19:40:52.929016 systemd[1]: Created slice kubepods-besteffort-pod68b62776_b6da_47bb_8aed_a241b87efe8a.slice. Mar 17 19:40:53.021165 kubelet[1468]: I0317 19:40:53.021093 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hv96m\" (UniqueName: \"kubernetes.io/projected/68b62776-b6da-47bb-8aed-a241b87efe8a-kube-api-access-hv96m\") pod \"nginx-deployment-85f456d6dd-c87mw\" (UID: \"68b62776-b6da-47bb-8aed-a241b87efe8a\") " pod="default/nginx-deployment-85f456d6dd-c87mw" Mar 17 19:40:53.179681 kubelet[1468]: E0317 19:40:53.179014 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:53.234245 env[1158]: time="2025-03-17T19:40:53.234171662Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-c87mw,Uid:68b62776-b6da-47bb-8aed-a241b87efe8a,Namespace:default,Attempt:0,}" Mar 17 19:40:53.362330 env[1158]: time="2025-03-17T19:40:53.362256907Z" level=error msg="Failed to destroy network for sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:40:53.365925 env[1158]: time="2025-03-17T19:40:53.364322037Z" level=error msg="encountered an error cleaning up failed sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:40:53.365925 env[1158]: time="2025-03-17T19:40:53.364374442Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-c87mw,Uid:68b62776-b6da-47bb-8aed-a241b87efe8a,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:40:53.366060 kubelet[1468]: E0317 19:40:53.365297 1468 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:40:53.366060 kubelet[1468]: E0317 19:40:53.365434 1468 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-c87mw" Mar 17 19:40:53.366060 kubelet[1468]: E0317 19:40:53.365459 1468 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-c87mw" Mar 17 19:40:53.364064 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2-shm.mount: Deactivated successfully. Mar 17 19:40:53.366239 kubelet[1468]: E0317 19:40:53.365500 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-c87mw_default(68b62776-b6da-47bb-8aed-a241b87efe8a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-c87mw_default(68b62776-b6da-47bb-8aed-a241b87efe8a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-c87mw" podUID="68b62776-b6da-47bb-8aed-a241b87efe8a" Mar 17 19:40:53.532473 kubelet[1468]: I0317 19:40:53.529897 1468 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:40:53.532995 env[1158]: time="2025-03-17T19:40:53.532934125Z" level=info msg="StopPodSandbox for \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\"" Mar 17 19:40:53.607477 env[1158]: time="2025-03-17T19:40:53.607368173Z" level=error msg="StopPodSandbox for \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\" failed" error="failed to destroy network for sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:40:53.608561 kubelet[1468]: E0317 19:40:53.608079 1468 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:40:53.608561 kubelet[1468]: E0317 19:40:53.608173 1468 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2"} Mar 17 19:40:53.608561 kubelet[1468]: E0317 19:40:53.608260 1468 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68b62776-b6da-47bb-8aed-a241b87efe8a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 19:40:53.608561 kubelet[1468]: E0317 19:40:53.608440 1468 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68b62776-b6da-47bb-8aed-a241b87efe8a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-c87mw" podUID="68b62776-b6da-47bb-8aed-a241b87efe8a" Mar 17 19:40:54.180189 kubelet[1468]: E0317 19:40:54.180102 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:55.181266 kubelet[1468]: E0317 19:40:55.181155 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:56.182384 kubelet[1468]: E0317 19:40:56.182328 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:57.182523 kubelet[1468]: E0317 19:40:57.182457 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:58.183593 kubelet[1468]: E0317 19:40:58.183481 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:58.684270 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2763269977.mount: Deactivated successfully. Mar 17 19:40:59.043516 env[1158]: time="2025-03-17T19:40:59.042957209Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:59.046218 env[1158]: time="2025-03-17T19:40:59.046166510Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:59.049382 env[1158]: time="2025-03-17T19:40:59.049311644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:59.052308 env[1158]: time="2025-03-17T19:40:59.052244333Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:40:59.053681 env[1158]: time="2025-03-17T19:40:59.053621608Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Mar 17 19:40:59.086088 env[1158]: time="2025-03-17T19:40:59.085946152Z" level=info msg="CreateContainer within sandbox \"8fa566862e2db2125caf111c8c9ee405b7455bcb737c74e6f7f8e49dadfbb7c0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 19:40:59.118804 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount948233710.mount: Deactivated successfully. Mar 17 19:40:59.133119 env[1158]: time="2025-03-17T19:40:59.133019847Z" level=info msg="CreateContainer within sandbox \"8fa566862e2db2125caf111c8c9ee405b7455bcb737c74e6f7f8e49dadfbb7c0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"12bcf92438c9095fe8bfb9e84410fe608daa5626a82f78e98a2a046b1b364739\"" Mar 17 19:40:59.134338 env[1158]: time="2025-03-17T19:40:59.134286395Z" level=info msg="StartContainer for \"12bcf92438c9095fe8bfb9e84410fe608daa5626a82f78e98a2a046b1b364739\"" Mar 17 19:40:59.174493 systemd[1]: Started cri-containerd-12bcf92438c9095fe8bfb9e84410fe608daa5626a82f78e98a2a046b1b364739.scope. Mar 17 19:40:59.184050 kubelet[1468]: E0317 19:40:59.184000 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.202068 kernel: kauditd_printk_skb: 34 callbacks suppressed Mar 17 19:40:59.202176 kernel: audit: type=1400 audit(1742240459.199:546): avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd4c90191b8 items=0 ppid=1538 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:59.217420 kernel: audit: type=1300 audit(1742240459.199:546): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd4c90191b8 items=0 ppid=1538 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:59.217527 kernel: audit: type=1327 audit(1742240459.199:546): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132626366393234333863393039356665386266623965383434313066 Mar 17 19:40:59.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132626366393234333863393039356665386266623965383434313066 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.235286 kernel: audit: type=1400 audit(1742240459.199:547): avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.235419 kernel: audit: type=1400 audit(1742240459.199:547): avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.240858 kernel: audit: type=1400 audit(1742240459.199:547): avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.240964 kernel: audit: type=1400 audit(1742240459.199:547): avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.255923 kernel: audit: type=1400 audit(1742240459.199:547): avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.256055 kernel: audit: type=1400 audit(1742240459.199:547): avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.265168 kernel: audit: type=1400 audit(1742240459.199:547): avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit: BPF prog-id=78 op=LOAD Mar 17 19:40:59.199000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000381fb8 items=0 ppid=1538 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:59.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132626366393234333863393039356665386266623965383434313066 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit: BPF prog-id=79 op=LOAD Mar 17 19:40:59.199000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d4008 items=0 ppid=1538 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:59.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132626366393234333863393039356665386266623965383434313066 Mar 17 19:40:59.199000 audit: BPF prog-id=79 op=UNLOAD Mar 17 19:40:59.199000 audit: BPF prog-id=78 op=UNLOAD Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:40:59.199000 audit: BPF prog-id=80 op=LOAD Mar 17 19:40:59.199000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d4098 items=0 ppid=1538 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:40:59.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132626366393234333863393039356665386266623965383434313066 Mar 17 19:40:59.276763 env[1158]: time="2025-03-17T19:40:59.276689163Z" level=info msg="StartContainer for \"12bcf92438c9095fe8bfb9e84410fe608daa5626a82f78e98a2a046b1b364739\" returns successfully" Mar 17 19:40:59.367375 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Mar 17 19:40:59.367476 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Mar 17 19:41:00.184312 kubelet[1468]: E0317 19:41:00.184246 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:00.416349 env[1158]: time="2025-03-17T19:41:00.416280622Z" level=info msg="StopPodSandbox for \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\"" Mar 17 19:41:00.528082 kubelet[1468]: I0317 19:41:00.527192 1468 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-d2mmp" podStartSLOduration=4.371592128 podStartE2EDuration="34.527139529s" podCreationTimestamp="2025-03-17 19:40:26 +0000 UTC" firstStartedPulling="2025-03-17 19:40:28.900384579 +0000 UTC m=+3.881260174" lastFinishedPulling="2025-03-17 19:40:59.05593193 +0000 UTC m=+34.036807575" observedRunningTime="2025-03-17 19:40:59.590295906 +0000 UTC m=+34.571171501" watchObservedRunningTime="2025-03-17 19:41:00.527139529 +0000 UTC m=+35.508015184" Mar 17 19:41:00.600285 systemd[1]: run-containerd-runc-k8s.io-12bcf92438c9095fe8bfb9e84410fe608daa5626a82f78e98a2a046b1b364739-runc.Opq5g2.mount: Deactivated successfully. Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.528 [INFO][2104] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.529 [INFO][2104] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" iface="eth0" netns="/var/run/netns/cni-836d3697-d5ab-f9db-79cb-da7e561e467f" Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.529 [INFO][2104] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" iface="eth0" netns="/var/run/netns/cni-836d3697-d5ab-f9db-79cb-da7e561e467f" Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.530 [INFO][2104] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" iface="eth0" netns="/var/run/netns/cni-836d3697-d5ab-f9db-79cb-da7e561e467f" Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.530 [INFO][2104] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.530 [INFO][2104] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.605 [INFO][2111] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" HandleID="k8s-pod-network.11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.605 [INFO][2111] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.605 [INFO][2111] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.613 [WARNING][2111] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" HandleID="k8s-pod-network.11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.614 [INFO][2111] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" HandleID="k8s-pod-network.11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.617 [INFO][2111] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:41:00.620444 env[1158]: 2025-03-17 19:41:00.619 [INFO][2104] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:00.625795 env[1158]: time="2025-03-17T19:41:00.622292585Z" level=info msg="TearDown network for sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\" successfully" Mar 17 19:41:00.625795 env[1158]: time="2025-03-17T19:41:00.622324467Z" level=info msg="StopPodSandbox for \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\" returns successfully" Mar 17 19:41:00.622586 systemd[1]: run-netns-cni\x2d836d3697\x2dd5ab\x2df9db\x2d79cb\x2dda7e561e467f.mount: Deactivated successfully. Mar 17 19:41:00.626225 env[1158]: time="2025-03-17T19:41:00.626196484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tttv8,Uid:e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c,Namespace:calico-system,Attempt:1,}" Mar 17 19:41:00.798209 systemd-networkd[985]: calibb48dc148d2: Link UP Mar 17 19:41:00.802674 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 19:41:00.802757 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibb48dc148d2: link becomes ready Mar 17 19:41:00.802489 systemd-networkd[985]: calibb48dc148d2: Gained carrier Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.682 [INFO][2139] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.697 [INFO][2139] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.209-k8s-csi--node--driver--tttv8-eth0 csi-node-driver- calico-system e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c 1198 0 2025-03-17 19:40:26 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.24.4.209 csi-node-driver-tttv8 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calibb48dc148d2 [] []}} ContainerID="85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" Namespace="calico-system" Pod="csi-node-driver-tttv8" WorkloadEndpoint="172.24.4.209-k8s-csi--node--driver--tttv8-" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.697 [INFO][2139] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" Namespace="calico-system" Pod="csi-node-driver-tttv8" WorkloadEndpoint="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.726 [INFO][2154] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" HandleID="k8s-pod-network.85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.740 [INFO][2154] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" HandleID="k8s-pod-network.85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000317a20), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.209", "pod":"csi-node-driver-tttv8", "timestamp":"2025-03-17 19:41:00.726193222 +0000 UTC"}, Hostname:"172.24.4.209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.740 [INFO][2154] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.740 [INFO][2154] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.740 [INFO][2154] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.209' Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.742 [INFO][2154] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" host="172.24.4.209" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.746 [INFO][2154] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.209" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.751 [INFO][2154] ipam/ipam.go 489: Trying affinity for 192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.754 [INFO][2154] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.757 [INFO][2154] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.757 [INFO][2154] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.64/26 handle="k8s-pod-network.85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" host="172.24.4.209" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.759 [INFO][2154] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2 Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.767 [INFO][2154] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.64/26 handle="k8s-pod-network.85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" host="172.24.4.209" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.774 [INFO][2154] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.65/26] block=192.168.51.64/26 handle="k8s-pod-network.85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" host="172.24.4.209" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.774 [INFO][2154] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.65/26] handle="k8s-pod-network.85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" host="172.24.4.209" Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.774 [INFO][2154] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:41:00.820265 env[1158]: 2025-03-17 19:41:00.774 [INFO][2154] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.65/26] IPv6=[] ContainerID="85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" HandleID="k8s-pod-network.85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:00.820930 env[1158]: 2025-03-17 19:41:00.776 [INFO][2139] cni-plugin/k8s.go 386: Populated endpoint ContainerID="85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" Namespace="calico-system" Pod="csi-node-driver-tttv8" WorkloadEndpoint="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-csi--node--driver--tttv8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 40, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"", Pod:"csi-node-driver-tttv8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibb48dc148d2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:00.820930 env[1158]: 2025-03-17 19:41:00.777 [INFO][2139] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.65/32] ContainerID="85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" Namespace="calico-system" Pod="csi-node-driver-tttv8" WorkloadEndpoint="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:00.820930 env[1158]: 2025-03-17 19:41:00.777 [INFO][2139] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibb48dc148d2 ContainerID="85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" Namespace="calico-system" Pod="csi-node-driver-tttv8" WorkloadEndpoint="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:00.820930 env[1158]: 2025-03-17 19:41:00.803 [INFO][2139] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" Namespace="calico-system" Pod="csi-node-driver-tttv8" WorkloadEndpoint="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:00.820930 env[1158]: 2025-03-17 19:41:00.803 [INFO][2139] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" Namespace="calico-system" Pod="csi-node-driver-tttv8" WorkloadEndpoint="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-csi--node--driver--tttv8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 40, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2", Pod:"csi-node-driver-tttv8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibb48dc148d2", MAC:"ea:29:60:2f:aa:03", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:00.820930 env[1158]: 2025-03-17 19:41:00.817 [INFO][2139] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2" Namespace="calico-system" Pod="csi-node-driver-tttv8" WorkloadEndpoint="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:00.839740 env[1158]: time="2025-03-17T19:41:00.839359083Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:41:00.839740 env[1158]: time="2025-03-17T19:41:00.839447525Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:41:00.839740 env[1158]: time="2025-03-17T19:41:00.839482013Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:41:00.840043 env[1158]: time="2025-03-17T19:41:00.839871363Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2 pid=2181 runtime=io.containerd.runc.v2 Mar 17 19:41:00.883000 audit[2232]: AVC avc: denied { write } for pid=2232 comm="tee" name="fd" dev="proc" ino=19718 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:41:00.883000 audit[2232]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc8543a0e a2=241 a3=1b6 items=1 ppid=2207 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.883000 audit: CWD cwd="/etc/service/enabled/bird6/log" Mar 17 19:41:00.883000 audit: PATH item=0 name="/dev/fd/63" inode=19218 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:00.883000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:41:00.888000 audit[2239]: AVC avc: denied { write } for pid=2239 comm="tee" name="fd" dev="proc" ino=19731 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:41:00.888000 audit[2239]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc997d2a0f a2=241 a3=1b6 items=1 ppid=2209 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.888000 audit: CWD cwd="/etc/service/enabled/bird/log" Mar 17 19:41:00.888000 audit: PATH item=0 name="/dev/fd/63" inode=19728 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:00.888000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:41:00.910499 systemd[1]: run-containerd-runc-k8s.io-85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2-runc.eyNktn.mount: Deactivated successfully. Mar 17 19:41:00.913590 systemd[1]: Started cri-containerd-85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2.scope. Mar 17 19:41:00.945000 audit[2244]: AVC avc: denied { write } for pid=2244 comm="tee" name="fd" dev="proc" ino=19270 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:41:00.945000 audit[2244]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4bcf0a0e a2=241 a3=1b6 items=1 ppid=2211 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.945000 audit: CWD cwd="/etc/service/enabled/confd/log" Mar 17 19:41:00.945000 audit: PATH item=0 name="/dev/fd/63" inode=19227 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:00.945000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:41:00.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit: BPF prog-id=81 op=LOAD Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2181 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643938663231353832303362363866323838316262393632356661 Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2181 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643938663231353832303362363866323838316262393632356661 Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.946000 audit: BPF prog-id=82 op=LOAD Mar 17 19:41:00.946000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003500b0 items=0 ppid=2181 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643938663231353832303362363866323838316262393632356661 Mar 17 19:41:00.948000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.948000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.948000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.948000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.948000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.948000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.948000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.948000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.948000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.948000 audit: BPF prog-id=83 op=LOAD Mar 17 19:41:00.948000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003500f8 items=0 ppid=2181 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643938663231353832303362363866323838316262393632356661 Mar 17 19:41:00.949000 audit: BPF prog-id=83 op=UNLOAD Mar 17 19:41:00.949000 audit: BPF prog-id=82 op=UNLOAD Mar 17 19:41:00.950000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.950000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.950000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.950000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.950000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.950000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.950000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.950000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.950000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.950000 audit[2276]: AVC avc: denied { write } for pid=2276 comm="tee" name="fd" dev="proc" ino=19276 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:41:00.950000 audit[2276]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3a64c9ff a2=241 a3=1b6 items=1 ppid=2217 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.950000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Mar 17 19:41:00.950000 audit: PATH item=0 name="/dev/fd/63" inode=19255 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:00.950000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:41:00.950000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:00.950000 audit: BPF prog-id=84 op=LOAD Mar 17 19:41:00.950000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000350508 items=0 ppid=2181 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643938663231353832303362363866323838316262393632356661 Mar 17 19:41:00.955000 audit[2269]: AVC avc: denied { write } for pid=2269 comm="tee" name="fd" dev="proc" ino=19793 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:41:00.955000 audit[2269]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3df7ca0e a2=241 a3=1b6 items=1 ppid=2221 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.955000 audit: CWD cwd="/etc/service/enabled/felix/log" Mar 17 19:41:00.955000 audit: PATH item=0 name="/dev/fd/63" inode=19779 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:00.955000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:41:00.963000 audit[2283]: AVC avc: denied { write } for pid=2283 comm="tee" name="fd" dev="proc" ino=19307 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:41:00.963000 audit[2283]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe73576a10 a2=241 a3=1b6 items=1 ppid=2235 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.963000 audit: CWD cwd="/etc/service/enabled/cni/log" Mar 17 19:41:00.963000 audit: PATH item=0 name="/dev/fd/63" inode=19278 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:00.963000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:41:00.976524 env[1158]: time="2025-03-17T19:41:00.976480118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tttv8,Uid:e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c,Namespace:calico-system,Attempt:1,} returns sandbox id \"85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2\"" Mar 17 19:41:00.978221 env[1158]: time="2025-03-17T19:41:00.978150548Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Mar 17 19:41:00.981000 audit[2285]: AVC avc: denied { write } for pid=2285 comm="tee" name="fd" dev="proc" ino=19312 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:41:00.981000 audit[2285]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe498829fe a2=241 a3=1b6 items=1 ppid=2216 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:00.981000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Mar 17 19:41:00.981000 audit: PATH item=0 name="/dev/fd/63" inode=19797 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:00.981000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit: BPF prog-id=85 op=LOAD Mar 17 19:41:01.178000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd49e81250 a2=98 a3=3 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.178000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.178000 audit: BPF prog-id=85 op=UNLOAD Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.178000 audit: BPF prog-id=86 op=LOAD Mar 17 19:41:01.178000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd49e81030 a2=74 a3=540051 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.178000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.179000 audit: BPF prog-id=86 op=UNLOAD Mar 17 19:41:01.179000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.179000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.179000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.179000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.179000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.179000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.179000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.179000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.179000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.179000 audit: BPF prog-id=87 op=LOAD Mar 17 19:41:01.179000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd49e81060 a2=94 a3=2 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.179000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.179000 audit: BPF prog-id=87 op=UNLOAD Mar 17 19:41:01.185214 kubelet[1468]: E0317 19:41:01.185159 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:01.318000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.318000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.318000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.318000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.318000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.318000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.318000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.318000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.318000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.318000 audit: BPF prog-id=88 op=LOAD Mar 17 19:41:01.318000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd49e80f20 a2=40 a3=1 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.318000 audit: BPF prog-id=88 op=UNLOAD Mar 17 19:41:01.318000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.318000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd49e80ff0 a2=50 a3=7ffd49e810d0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e80f30 a2=28 a3=0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd49e80f60 a2=28 a3=0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd49e80e70 a2=28 a3=0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e80f80 a2=28 a3=0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e80f60 a2=28 a3=0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e80f50 a2=28 a3=0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e80f80 a2=28 a3=0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd49e80f60 a2=28 a3=0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd49e80f80 a2=28 a3=0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd49e80f50 a2=28 a3=0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e80fc0 a2=28 a3=0 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd49e80d70 a2=50 a3=1 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit: BPF prog-id=89 op=LOAD Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd49e80d70 a2=94 a3=5 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit: BPF prog-id=89 op=UNLOAD Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd49e80e20 a2=50 a3=1 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd49e80f40 a2=4 a3=38 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.329000 audit[2328]: AVC avc: denied { confidentiality } for pid=2328 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:01.329000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd49e80f90 a2=94 a3=6 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { confidentiality } for pid=2328 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:01.330000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd49e80740 a2=94 a3=83 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.330000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.330000 audit[2328]: AVC avc: denied { confidentiality } for pid=2328 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:01.330000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd49e80740 a2=94 a3=83 items=0 ppid=2222 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.330000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit: BPF prog-id=90 op=LOAD Mar 17 19:41:01.344000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8438c3f0 a2=98 a3=1999999999999999 items=0 ppid=2222 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.344000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 19:41:01.344000 audit: BPF prog-id=90 op=UNLOAD Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit: BPF prog-id=91 op=LOAD Mar 17 19:41:01.344000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8438c2d0 a2=74 a3=ffff items=0 ppid=2222 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.344000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 19:41:01.344000 audit: BPF prog-id=91 op=UNLOAD Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.344000 audit: BPF prog-id=92 op=LOAD Mar 17 19:41:01.344000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8438c310 a2=40 a3=7ffe8438c4f0 items=0 ppid=2222 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.344000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 19:41:01.345000 audit: BPF prog-id=92 op=UNLOAD Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit: BPF prog-id=93 op=LOAD Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc0aa9dc0 a2=98 a3=ffff items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit: BPF prog-id=93 op=UNLOAD Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit: BPF prog-id=94 op=LOAD Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc0aa9bd0 a2=74 a3=540051 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit: BPF prog-id=94 op=UNLOAD Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit: BPF prog-id=95 op=LOAD Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc0aa9c00 a2=94 a3=2 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit: BPF prog-id=95 op=UNLOAD Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc0aa9ad0 a2=28 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc0aa9b00 a2=28 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc0aa9a10 a2=28 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc0aa9b20 a2=28 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc0aa9b00 a2=28 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc0aa9af0 a2=28 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc0aa9b20 a2=28 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc0aa9b00 a2=28 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc0aa9b20 a2=28 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc0aa9af0 a2=28 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc0aa9b60 a2=28 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.460000 audit: BPF prog-id=96 op=LOAD Mar 17 19:41:01.460000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcc0aa99d0 a2=40 a3=0 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.460000 audit: BPF prog-id=96 op=UNLOAD Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcc0aa99c0 a2=50 a3=2800 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.461000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcc0aa99c0 a2=50 a3=2800 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.461000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.461000 audit: BPF prog-id=97 op=LOAD Mar 17 19:41:01.461000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcc0aa91e0 a2=94 a3=2 items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.461000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.462000 audit: BPF prog-id=97 op=UNLOAD Mar 17 19:41:01.462000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.462000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.462000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.462000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.462000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.462000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.462000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.462000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.462000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.462000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.462000 audit: BPF prog-id=98 op=LOAD Mar 17 19:41:01.462000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcc0aa92e0 a2=94 a3=2d items=0 ppid=2222 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.462000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit: BPF prog-id=99 op=LOAD Mar 17 19:41:01.465000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffffaca4750 a2=98 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.465000 audit: BPF prog-id=99 op=UNLOAD Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.465000 audit: BPF prog-id=100 op=LOAD Mar 17 19:41:01.465000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffaca4530 a2=74 a3=540051 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.466000 audit: BPF prog-id=100 op=UNLOAD Mar 17 19:41:01.466000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.466000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.466000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.466000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.466000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.466000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.466000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.466000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.466000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.466000 audit: BPF prog-id=101 op=LOAD Mar 17 19:41:01.466000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffaca4560 a2=94 a3=2 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.466000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.466000 audit: BPF prog-id=101 op=UNLOAD Mar 17 19:41:01.460389 systemd-networkd[985]: vxlan.calico: Link UP Mar 17 19:41:01.460399 systemd-networkd[985]: vxlan.calico: Gained carrier Mar 17 19:41:01.617000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.617000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.617000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.617000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.617000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.617000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.617000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.617000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.617000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.617000 audit: BPF prog-id=102 op=LOAD Mar 17 19:41:01.617000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffaca4420 a2=40 a3=1 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.617000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.618000 audit: BPF prog-id=102 op=UNLOAD Mar 17 19:41:01.618000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.618000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffffaca44f0 a2=50 a3=7ffffaca45d0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.618000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.628000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.628000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffaca4430 a2=28 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.628000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.628000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffaca4460 a2=28 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.628000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.628000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffaca4370 a2=28 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.628000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.628000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffaca4480 a2=28 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.628000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.628000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffaca4460 a2=28 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.628000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.628000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffaca4450 a2=28 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.628000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.628000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffaca4480 a2=28 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.628000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.628000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffaca4460 a2=28 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.628000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.628000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffaca4480 a2=28 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.628000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.628000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffaca4450 a2=28 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.628000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.628000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffaca44c0 a2=28 a3=0 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffffaca4270 a2=50 a3=1 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit: BPF prog-id=103 op=LOAD Mar 17 19:41:01.629000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffffaca4270 a2=94 a3=5 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.629000 audit: BPF prog-id=103 op=UNLOAD Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffffaca4320 a2=50 a3=1 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffffaca4440 a2=4 a3=38 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { confidentiality } for pid=2363 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:01.629000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffaca4490 a2=94 a3=6 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { confidentiality } for pid=2363 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:01.629000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffaca3c40 a2=94 a3=83 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.629000 audit[2363]: AVC avc: denied { confidentiality } for pid=2363 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:01.629000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffaca3c40 a2=94 a3=83 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.630000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.630000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffaca5680 a2=10 a3=f0f1 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.630000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.630000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.630000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffaca5520 a2=10 a3=3 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.630000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.630000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.630000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffaca54c0 a2=10 a3=3 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.630000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.630000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:01.630000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffaca54c0 a2=10 a3=7 items=0 ppid=2222 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.630000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:41:01.642000 audit: BPF prog-id=98 op=UNLOAD Mar 17 19:41:01.766000 audit[2388]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:41:01.766000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc8676c880 a2=0 a3=7ffc8676c86c items=0 ppid=2222 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.766000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:41:01.786000 audit[2389]: NETFILTER_CFG table=filter:66 family=2 entries=69 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:41:01.786000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=36404 a0=3 a1=7fff70067d90 a2=0 a3=7fff70067d7c items=0 ppid=2222 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.786000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:41:01.787000 audit[2387]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:41:01.787000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd6db8fc70 a2=0 a3=7ffd6db8fc5c items=0 ppid=2222 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.787000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:41:01.805000 audit[2386]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:41:01.805000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc85694720 a2=0 a3=7ffc8569470c items=0 ppid=2222 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:01.805000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:41:01.883318 systemd-networkd[985]: calibb48dc148d2: Gained IPv6LL Mar 17 19:41:02.185984 kubelet[1468]: E0317 19:41:02.185895 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:02.972194 systemd-networkd[985]: vxlan.calico: Gained IPv6LL Mar 17 19:41:03.186578 kubelet[1468]: E0317 19:41:03.186509 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:03.511315 env[1158]: time="2025-03-17T19:41:03.511274331Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:03.514320 env[1158]: time="2025-03-17T19:41:03.514294435Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:03.519961 env[1158]: time="2025-03-17T19:41:03.519938976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:03.522894 env[1158]: time="2025-03-17T19:41:03.522858374Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:03.524278 env[1158]: time="2025-03-17T19:41:03.524209183Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Mar 17 19:41:03.529125 env[1158]: time="2025-03-17T19:41:03.529095895Z" level=info msg="CreateContainer within sandbox \"85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Mar 17 19:41:03.556972 env[1158]: time="2025-03-17T19:41:03.556910869Z" level=info msg="CreateContainer within sandbox \"85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9c0c40bb05b26656e3b8671fb90617eda07ccaae3fe2677b0dc07057f3d00835\"" Mar 17 19:41:03.557051 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1017205160.mount: Deactivated successfully. Mar 17 19:41:03.559034 env[1158]: time="2025-03-17T19:41:03.558951585Z" level=info msg="StartContainer for \"9c0c40bb05b26656e3b8671fb90617eda07ccaae3fe2677b0dc07057f3d00835\"" Mar 17 19:41:03.610175 systemd[1]: Started cri-containerd-9c0c40bb05b26656e3b8671fb90617eda07ccaae3fe2677b0dc07057f3d00835.scope. Mar 17 19:41:03.625000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.625000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fef38463bf8 items=0 ppid=2181 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:03.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963306334306262303562323636353665336238363731666239303631 Mar 17 19:41:03.625000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.625000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.625000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.625000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.625000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.625000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.625000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.625000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.625000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.625000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.625000 audit: BPF prog-id=104 op=LOAD Mar 17 19:41:03.625000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001acba8 items=0 ppid=2181 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:03.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963306334306262303562323636353665336238363731666239303631 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit: BPF prog-id=105 op=LOAD Mar 17 19:41:03.626000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001acbf8 items=0 ppid=2181 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:03.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963306334306262303562323636353665336238363731666239303631 Mar 17 19:41:03.626000 audit: BPF prog-id=105 op=UNLOAD Mar 17 19:41:03.626000 audit: BPF prog-id=104 op=UNLOAD Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:03.626000 audit: BPF prog-id=106 op=LOAD Mar 17 19:41:03.626000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001acc88 items=0 ppid=2181 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:03.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963306334306262303562323636353665336238363731666239303631 Mar 17 19:41:03.647136 env[1158]: time="2025-03-17T19:41:03.647091768Z" level=info msg="StartContainer for \"9c0c40bb05b26656e3b8671fb90617eda07ccaae3fe2677b0dc07057f3d00835\" returns successfully" Mar 17 19:41:03.648784 env[1158]: time="2025-03-17T19:41:03.648759782Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Mar 17 19:41:04.187484 kubelet[1468]: E0317 19:41:04.187365 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:05.188678 kubelet[1468]: E0317 19:41:05.188603 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:06.157205 kubelet[1468]: E0317 19:41:06.157126 1468 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:06.189274 kubelet[1468]: E0317 19:41:06.189173 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:06.419804 env[1158]: time="2025-03-17T19:41:06.418040492Z" level=info msg="StopPodSandbox for \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\"" Mar 17 19:41:06.522707 env[1158]: time="2025-03-17T19:41:06.522658679Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:06.527477 env[1158]: time="2025-03-17T19:41:06.526592361Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:06.529438 env[1158]: time="2025-03-17T19:41:06.529388510Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:06.531871 env[1158]: time="2025-03-17T19:41:06.531832300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:06.533669 env[1158]: time="2025-03-17T19:41:06.532663451Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Mar 17 19:41:06.538331 env[1158]: time="2025-03-17T19:41:06.538290607Z" level=info msg="CreateContainer within sandbox \"85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Mar 17 19:41:06.555885 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1100861682.mount: Deactivated successfully. Mar 17 19:41:06.565723 env[1158]: time="2025-03-17T19:41:06.565677368Z" level=info msg="CreateContainer within sandbox \"85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ea085c6ff4e92e7c7fcc6bc4b788a92c0c2c8c6b7285e5435ae82cf3e3cb49d1\"" Mar 17 19:41:06.566468 env[1158]: time="2025-03-17T19:41:06.566442573Z" level=info msg="StartContainer for \"ea085c6ff4e92e7c7fcc6bc4b788a92c0c2c8c6b7285e5435ae82cf3e3cb49d1\"" Mar 17 19:41:06.611517 systemd[1]: Started cri-containerd-ea085c6ff4e92e7c7fcc6bc4b788a92c0c2c8c6b7285e5435ae82cf3e3cb49d1.scope. Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.527 [INFO][2455] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.528 [INFO][2455] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" iface="eth0" netns="/var/run/netns/cni-d5813400-0174-70e2-cc11-307786d68911" Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.528 [INFO][2455] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" iface="eth0" netns="/var/run/netns/cni-d5813400-0174-70e2-cc11-307786d68911" Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.528 [INFO][2455] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" iface="eth0" netns="/var/run/netns/cni-d5813400-0174-70e2-cc11-307786d68911" Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.528 [INFO][2455] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.528 [INFO][2455] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.595 [INFO][2462] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" HandleID="k8s-pod-network.1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.595 [INFO][2462] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.595 [INFO][2462] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.609 [WARNING][2462] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" HandleID="k8s-pod-network.1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.610 [INFO][2462] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" HandleID="k8s-pod-network.1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.614 [INFO][2462] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:41:06.621769 env[1158]: 2025-03-17 19:41:06.618 [INFO][2455] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:06.622690 env[1158]: time="2025-03-17T19:41:06.622639199Z" level=info msg="TearDown network for sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\" successfully" Mar 17 19:41:06.622794 env[1158]: time="2025-03-17T19:41:06.622774620Z" level=info msg="StopPodSandbox for \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\" returns successfully" Mar 17 19:41:06.624275 systemd[1]: run-netns-cni\x2dd5813400\x2d0174\x2d70e2\x2dcc11\x2d307786d68911.mount: Deactivated successfully. Mar 17 19:41:06.625509 env[1158]: time="2025-03-17T19:41:06.625486827Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-c87mw,Uid:68b62776-b6da-47bb-8aed-a241b87efe8a,Namespace:default,Attempt:1,}" Mar 17 19:41:06.638563 kernel: kauditd_printk_skb: 648 callbacks suppressed Mar 17 19:41:06.638664 kernel: audit: type=1400 audit(1742240466.632:678): avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.632000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.632000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f5744194328 items=0 ppid=2181 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:06.645850 kernel: audit: type=1300 audit(1742240466.632:678): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f5744194328 items=0 ppid=2181 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:06.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303835633666663465393265376337666363366263346237383861 Mar 17 19:41:06.640000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.658477 kernel: audit: type=1327 audit(1742240466.632:678): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303835633666663465393265376337666363366263346237383861 Mar 17 19:41:06.658553 kernel: audit: type=1400 audit(1742240466.640:679): avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.640000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.640000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.668157 kernel: audit: type=1400 audit(1742240466.640:679): avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.668270 kernel: audit: type=1400 audit(1742240466.640:679): avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.640000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.673230 kernel: audit: type=1400 audit(1742240466.640:679): avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.678723 kernel: audit: type=1400 audit(1742240466.640:679): avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.640000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.678899 kernel: audit: type=1400 audit(1742240466.640:679): avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.640000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.640000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.689442 kernel: audit: type=1400 audit(1742240466.640:679): avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.640000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.640000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.640000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.640000 audit: BPF prog-id=107 op=LOAD Mar 17 19:41:06.640000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000212af8 items=0 ppid=2181 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:06.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303835633666663465393265376337666363366263346237383861 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit: BPF prog-id=108 op=LOAD Mar 17 19:41:06.644000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000212b48 items=0 ppid=2181 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:06.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303835633666663465393265376337666363366263346237383861 Mar 17 19:41:06.644000 audit: BPF prog-id=108 op=UNLOAD Mar 17 19:41:06.644000 audit: BPF prog-id=107 op=UNLOAD Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { perfmon } for pid=2474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit[2474]: AVC avc: denied { bpf } for pid=2474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:06.644000 audit: BPF prog-id=109 op=LOAD Mar 17 19:41:06.644000 audit[2474]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000212bd8 items=0 ppid=2181 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:06.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303835633666663465393265376337666363366263346237383861 Mar 17 19:41:06.770561 env[1158]: time="2025-03-17T19:41:06.770484436Z" level=info msg="StartContainer for \"ea085c6ff4e92e7c7fcc6bc4b788a92c0c2c8c6b7285e5435ae82cf3e3cb49d1\" returns successfully" Mar 17 19:41:07.190131 kubelet[1468]: E0317 19:41:07.190029 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:07.353970 kubelet[1468]: I0317 19:41:07.353014 1468 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Mar 17 19:41:07.353970 kubelet[1468]: I0317 19:41:07.353072 1468 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Mar 17 19:41:07.407318 systemd-networkd[985]: cali7c074d7fbc8: Link UP Mar 17 19:41:07.416495 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 19:41:07.417388 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7c074d7fbc8: link becomes ready Mar 17 19:41:07.417002 systemd-networkd[985]: cali7c074d7fbc8: Gained carrier Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.235 [INFO][2518] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0 nginx-deployment-85f456d6dd- default 68b62776-b6da-47bb-8aed-a241b87efe8a 1221 0 2025-03-17 19:40:52 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.209 nginx-deployment-85f456d6dd-c87mw eth0 default [] [] [kns.default ksa.default.default] cali7c074d7fbc8 [] []}} ContainerID="0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" Namespace="default" Pod="nginx-deployment-85f456d6dd-c87mw" WorkloadEndpoint="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.235 [INFO][2518] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" Namespace="default" Pod="nginx-deployment-85f456d6dd-c87mw" WorkloadEndpoint="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.298 [INFO][2529] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" HandleID="k8s-pod-network.0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.323 [INFO][2529] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" HandleID="k8s-pod-network.0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290b70), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.209", "pod":"nginx-deployment-85f456d6dd-c87mw", "timestamp":"2025-03-17 19:41:07.298487761 +0000 UTC"}, Hostname:"172.24.4.209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.323 [INFO][2529] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.324 [INFO][2529] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.324 [INFO][2529] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.209' Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.328 [INFO][2529] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" host="172.24.4.209" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.338 [INFO][2529] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.209" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.350 [INFO][2529] ipam/ipam.go 489: Trying affinity for 192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.358 [INFO][2529] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.363 [INFO][2529] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.363 [INFO][2529] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.64/26 handle="k8s-pod-network.0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" host="172.24.4.209" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.367 [INFO][2529] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504 Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.379 [INFO][2529] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.64/26 handle="k8s-pod-network.0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" host="172.24.4.209" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.392 [INFO][2529] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.66/26] block=192.168.51.64/26 handle="k8s-pod-network.0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" host="172.24.4.209" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.393 [INFO][2529] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.66/26] handle="k8s-pod-network.0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" host="172.24.4.209" Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.393 [INFO][2529] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:41:07.443580 env[1158]: 2025-03-17 19:41:07.393 [INFO][2529] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.66/26] IPv6=[] ContainerID="0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" HandleID="k8s-pod-network.0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:07.445434 env[1158]: 2025-03-17 19:41:07.397 [INFO][2518] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" Namespace="default" Pod="nginx-deployment-85f456d6dd-c87mw" WorkloadEndpoint="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"68b62776-b6da-47bb-8aed-a241b87efe8a", ResourceVersion:"1221", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-c87mw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7c074d7fbc8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:07.445434 env[1158]: 2025-03-17 19:41:07.398 [INFO][2518] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.66/32] ContainerID="0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" Namespace="default" Pod="nginx-deployment-85f456d6dd-c87mw" WorkloadEndpoint="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:07.445434 env[1158]: 2025-03-17 19:41:07.398 [INFO][2518] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7c074d7fbc8 ContainerID="0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" Namespace="default" Pod="nginx-deployment-85f456d6dd-c87mw" WorkloadEndpoint="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:07.445434 env[1158]: 2025-03-17 19:41:07.418 [INFO][2518] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" Namespace="default" Pod="nginx-deployment-85f456d6dd-c87mw" WorkloadEndpoint="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:07.445434 env[1158]: 2025-03-17 19:41:07.419 [INFO][2518] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" Namespace="default" Pod="nginx-deployment-85f456d6dd-c87mw" WorkloadEndpoint="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"68b62776-b6da-47bb-8aed-a241b87efe8a", ResourceVersion:"1221", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504", Pod:"nginx-deployment-85f456d6dd-c87mw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7c074d7fbc8", MAC:"ce:ed:c3:10:eb:1e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:07.445434 env[1158]: 2025-03-17 19:41:07.437 [INFO][2518] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504" Namespace="default" Pod="nginx-deployment-85f456d6dd-c87mw" WorkloadEndpoint="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:07.468179 env[1158]: time="2025-03-17T19:41:07.468070704Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:41:07.468179 env[1158]: time="2025-03-17T19:41:07.468165347Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:41:07.468481 env[1158]: time="2025-03-17T19:41:07.468211445Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:41:07.468481 env[1158]: time="2025-03-17T19:41:07.468380811Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504 pid=2560 runtime=io.containerd.runc.v2 Mar 17 19:41:07.470000 audit[2552]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2552 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:41:07.470000 audit[2552]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fff0de08080 a2=0 a3=7fff0de0806c items=0 ppid=2222 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:07.470000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:41:07.483636 systemd[1]: Started cri-containerd-0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504.scope. Mar 17 19:41:07.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.496000 audit: BPF prog-id=110 op=LOAD Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2560 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:07.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063656338613438356236383165613364366164306565323062353639 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2560 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:07.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063656338613438356236383165613364366164306565323062353639 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit: BPF prog-id=111 op=LOAD Mar 17 19:41:07.497000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028b970 items=0 ppid=2560 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:07.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063656338613438356236383165613364366164306565323062353639 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit: BPF prog-id=112 op=LOAD Mar 17 19:41:07.497000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028b9b8 items=0 ppid=2560 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:07.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063656338613438356236383165613364366164306565323062353639 Mar 17 19:41:07.497000 audit: BPF prog-id=112 op=UNLOAD Mar 17 19:41:07.497000 audit: BPF prog-id=111 op=UNLOAD Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:07.497000 audit: BPF prog-id=113 op=LOAD Mar 17 19:41:07.497000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028bdc8 items=0 ppid=2560 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:07.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063656338613438356236383165613364366164306565323062353639 Mar 17 19:41:07.528392 env[1158]: time="2025-03-17T19:41:07.528333101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-c87mw,Uid:68b62776-b6da-47bb-8aed-a241b87efe8a,Namespace:default,Attempt:1,} returns sandbox id \"0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504\"" Mar 17 19:41:07.530149 env[1158]: time="2025-03-17T19:41:07.530115030Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 19:41:07.621077 kubelet[1468]: I0317 19:41:07.620981 1468 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-tttv8" podStartSLOduration=36.063941274 podStartE2EDuration="41.620947063s" podCreationTimestamp="2025-03-17 19:40:26 +0000 UTC" firstStartedPulling="2025-03-17 19:41:00.977732642 +0000 UTC m=+35.958608237" lastFinishedPulling="2025-03-17 19:41:06.534738391 +0000 UTC m=+41.515614026" observedRunningTime="2025-03-17 19:41:07.620697072 +0000 UTC m=+42.601572717" watchObservedRunningTime="2025-03-17 19:41:07.620947063 +0000 UTC m=+42.601822708" Mar 17 19:41:08.191421 kubelet[1468]: E0317 19:41:08.191305 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:09.191637 kubelet[1468]: E0317 19:41:09.191544 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:09.437160 systemd-networkd[985]: cali7c074d7fbc8: Gained IPv6LL Mar 17 19:41:10.192808 kubelet[1468]: E0317 19:41:10.192726 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:11.193793 kubelet[1468]: E0317 19:41:11.193675 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:11.877268 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount852247694.mount: Deactivated successfully. Mar 17 19:41:12.195408 kubelet[1468]: E0317 19:41:12.194679 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:13.195518 kubelet[1468]: E0317 19:41:13.195445 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:14.038136 env[1158]: time="2025-03-17T19:41:14.038093799Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:14.041026 env[1158]: time="2025-03-17T19:41:14.041002003Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:14.044859 env[1158]: time="2025-03-17T19:41:14.044838978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:14.048320 env[1158]: time="2025-03-17T19:41:14.048296790Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:14.050208 env[1158]: time="2025-03-17T19:41:14.050133572Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee\"" Mar 17 19:41:14.056735 env[1158]: time="2025-03-17T19:41:14.056669812Z" level=info msg="CreateContainer within sandbox \"0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Mar 17 19:41:14.074022 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1085776862.mount: Deactivated successfully. Mar 17 19:41:14.082304 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1559804701.mount: Deactivated successfully. Mar 17 19:41:14.090505 env[1158]: time="2025-03-17T19:41:14.090464638Z" level=info msg="CreateContainer within sandbox \"0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"65f94a8f4ec47af3a105201f2f628ec9527062b3d5f74ae8d5f38079256711d8\"" Mar 17 19:41:14.091590 env[1158]: time="2025-03-17T19:41:14.091530130Z" level=info msg="StartContainer for \"65f94a8f4ec47af3a105201f2f628ec9527062b3d5f74ae8d5f38079256711d8\"" Mar 17 19:41:14.125805 systemd[1]: Started cri-containerd-65f94a8f4ec47af3a105201f2f628ec9527062b3d5f74ae8d5f38079256711d8.scope. Mar 17 19:41:14.155200 kernel: kauditd_printk_skb: 93 callbacks suppressed Mar 17 19:41:14.155286 kernel: audit: type=1400 audit(1742240474.148:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.155311 kernel: audit: type=1400 audit(1742240474.148:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159466 kernel: audit: type=1400 audit(1742240474.148:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.172950 kernel: audit: type=1400 audit(1742240474.148:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.172995 kernel: audit: type=1400 audit(1742240474.148:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.177463 kernel: audit: type=1400 audit(1742240474.148:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.186734 kernel: audit: type=1400 audit(1742240474.148:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.197349 kernel: audit: type=1400 audit(1742240474.148:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.197401 kernel: audit: type=1400 audit(1742240474.148:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.197483 kubelet[1468]: E0317 19:41:14.197420 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:14.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.202894 kernel: audit: type=1400 audit(1742240474.159:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit: BPF prog-id=114 op=LOAD Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=2560 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:14.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663934613866346563343761663361313035323031663266363238 Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=8 items=0 ppid=2560 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:14.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663934613866346563343761663361313035323031663266363238 Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.159000 audit: BPF prog-id=115 op=LOAD Mar 17 19:41:14.159000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c000298ce0 items=0 ppid=2560 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:14.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663934613866346563343761663361313035323031663266363238 Mar 17 19:41:14.168000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.168000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.168000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.168000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.168000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.168000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.168000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.168000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.168000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.168000 audit: BPF prog-id=116 op=LOAD Mar 17 19:41:14.168000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c000298d28 items=0 ppid=2560 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:14.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663934613866346563343761663361313035323031663266363238 Mar 17 19:41:14.181000 audit: BPF prog-id=116 op=UNLOAD Mar 17 19:41:14.181000 audit: BPF prog-id=115 op=UNLOAD Mar 17 19:41:14.181000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.181000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.181000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.181000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.181000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.181000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.181000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.181000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.181000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.181000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:14.181000 audit: BPF prog-id=117 op=LOAD Mar 17 19:41:14.181000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c000299138 items=0 ppid=2560 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:14.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663934613866346563343761663361313035323031663266363238 Mar 17 19:41:14.220238 env[1158]: time="2025-03-17T19:41:14.220188303Z" level=info msg="StartContainer for \"65f94a8f4ec47af3a105201f2f628ec9527062b3d5f74ae8d5f38079256711d8\" returns successfully" Mar 17 19:41:14.823736 kubelet[1468]: I0317 19:41:14.823595 1468 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-c87mw" podStartSLOduration=16.299313613 podStartE2EDuration="22.823529917s" podCreationTimestamp="2025-03-17 19:40:52 +0000 UTC" firstStartedPulling="2025-03-17 19:41:07.529659272 +0000 UTC m=+42.510534867" lastFinishedPulling="2025-03-17 19:41:14.053875536 +0000 UTC m=+49.034751171" observedRunningTime="2025-03-17 19:41:14.6783722 +0000 UTC m=+49.659247845" watchObservedRunningTime="2025-03-17 19:41:14.823529917 +0000 UTC m=+49.804405562" Mar 17 19:41:15.198885 kubelet[1468]: E0317 19:41:15.198665 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:16.200561 kubelet[1468]: E0317 19:41:16.200497 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:17.201578 kubelet[1468]: E0317 19:41:17.201521 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:18.203339 kubelet[1468]: E0317 19:41:18.203281 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:19.204170 kubelet[1468]: E0317 19:41:19.204102 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:20.204359 kubelet[1468]: E0317 19:41:20.204271 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:21.204909 kubelet[1468]: E0317 19:41:21.204803 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:22.205461 kubelet[1468]: E0317 19:41:22.205269 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:22.992000 audit[2687]: NETFILTER_CFG table=filter:70 family=2 entries=20 op=nft_register_rule pid=2687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:41:22.996681 kernel: kauditd_printk_skb: 47 callbacks suppressed Mar 17 19:41:22.996806 kernel: audit: type=1325 audit(1742240482.992:721): table=filter:70 family=2 entries=20 op=nft_register_rule pid=2687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:41:22.992000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffe758f060 a2=0 a3=7fffe758f04c items=0 ppid=1692 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.025329 kernel: audit: type=1300 audit(1742240482.992:721): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffe758f060 a2=0 a3=7fffe758f04c items=0 ppid=1692 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:22.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:41:23.026792 kubelet[1468]: I0317 19:41:23.026734 1468 topology_manager.go:215] "Topology Admit Handler" podUID="ebe436e7-3429-4d18-a027-595b90975376" podNamespace="default" podName="nfs-server-provisioner-0" Mar 17 19:41:23.034653 kernel: audit: type=1327 audit(1742240482.992:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:41:23.036000 audit[2687]: NETFILTER_CFG table=nat:71 family=2 entries=22 op=nft_register_rule pid=2687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:41:23.036000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffe758f060 a2=0 a3=0 items=0 ppid=1692 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.049489 systemd[1]: Created slice kubepods-besteffort-podebe436e7_3429_4d18_a027_595b90975376.slice. Mar 17 19:41:23.058415 kernel: audit: type=1325 audit(1742240483.036:722): table=nat:71 family=2 entries=22 op=nft_register_rule pid=2687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:41:23.058576 kernel: audit: type=1300 audit(1742240483.036:722): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffe758f060 a2=0 a3=0 items=0 ppid=1692 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.058640 kernel: audit: type=1327 audit(1742240483.036:722): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:41:23.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:41:23.069000 audit[2691]: NETFILTER_CFG table=filter:72 family=2 entries=32 op=nft_register_rule pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:41:23.069000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffccda1c60 a2=0 a3=7fffccda1c4c items=0 ppid=1692 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.075520 kubelet[1468]: I0317 19:41:23.074071 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ebe436e7-3429-4d18-a027-595b90975376-data\") pod \"nfs-server-provisioner-0\" (UID: \"ebe436e7-3429-4d18-a027-595b90975376\") " pod="default/nfs-server-provisioner-0" Mar 17 19:41:23.075520 kubelet[1468]: I0317 19:41:23.074294 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fqkrm\" (UniqueName: \"kubernetes.io/projected/ebe436e7-3429-4d18-a027-595b90975376-kube-api-access-fqkrm\") pod \"nfs-server-provisioner-0\" (UID: \"ebe436e7-3429-4d18-a027-595b90975376\") " pod="default/nfs-server-provisioner-0" Mar 17 19:41:23.082244 kernel: audit: type=1325 audit(1742240483.069:723): table=filter:72 family=2 entries=32 op=nft_register_rule pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:41:23.082369 kernel: audit: type=1300 audit(1742240483.069:723): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffccda1c60 a2=0 a3=7fffccda1c4c items=0 ppid=1692 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.082432 kernel: audit: type=1327 audit(1742240483.069:723): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:41:23.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:41:23.088721 kernel: audit: type=1325 audit(1742240483.087:724): table=nat:73 family=2 entries=22 op=nft_register_rule pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:41:23.087000 audit[2691]: NETFILTER_CFG table=nat:73 family=2 entries=22 op=nft_register_rule pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:41:23.087000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffccda1c60 a2=0 a3=0 items=0 ppid=1692 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.087000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:41:23.205481 kubelet[1468]: E0317 19:41:23.205403 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:23.363934 env[1158]: time="2025-03-17T19:41:23.363800465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ebe436e7-3429-4d18-a027-595b90975376,Namespace:default,Attempt:0,}" Mar 17 19:41:23.660764 systemd-networkd[985]: cali60e51b789ff: Link UP Mar 17 19:41:23.671196 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 19:41:23.671350 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Mar 17 19:41:23.672524 systemd-networkd[985]: cali60e51b789ff: Gained carrier Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.493 [INFO][2693] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.209-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ebe436e7-3429-4d18-a027-595b90975376 1294 0 2025-03-17 19:41:22 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.209 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.209-k8s-nfs--server--provisioner--0-" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.494 [INFO][2693] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.209-k8s-nfs--server--provisioner--0-eth0" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.562 [INFO][2705] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" HandleID="k8s-pod-network.da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" Workload="172.24.4.209-k8s-nfs--server--provisioner--0-eth0" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.587 [INFO][2705] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" HandleID="k8s-pod-network.da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" Workload="172.24.4.209-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031d9a0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.209", "pod":"nfs-server-provisioner-0", "timestamp":"2025-03-17 19:41:23.562914036 +0000 UTC"}, Hostname:"172.24.4.209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.587 [INFO][2705] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.587 [INFO][2705] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.587 [INFO][2705] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.209' Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.591 [INFO][2705] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" host="172.24.4.209" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.607 [INFO][2705] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.209" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.617 [INFO][2705] ipam/ipam.go 489: Trying affinity for 192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.621 [INFO][2705] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.627 [INFO][2705] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.627 [INFO][2705] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.64/26 handle="k8s-pod-network.da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" host="172.24.4.209" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.631 [INFO][2705] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11 Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.639 [INFO][2705] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.64/26 handle="k8s-pod-network.da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" host="172.24.4.209" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.652 [INFO][2705] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.67/26] block=192.168.51.64/26 handle="k8s-pod-network.da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" host="172.24.4.209" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.652 [INFO][2705] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.67/26] handle="k8s-pod-network.da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" host="172.24.4.209" Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.652 [INFO][2705] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:41:23.704471 env[1158]: 2025-03-17 19:41:23.652 [INFO][2705] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.67/26] IPv6=[] ContainerID="da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" HandleID="k8s-pod-network.da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" Workload="172.24.4.209-k8s-nfs--server--provisioner--0-eth0" Mar 17 19:41:23.713295 env[1158]: 2025-03-17 19:41:23.654 [INFO][2693] cni-plugin/k8s.go 386: Populated endpoint ContainerID="da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.209-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ebe436e7-3429-4d18-a027-595b90975376", ResourceVersion:"1294", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 41, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.51.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:23.713295 env[1158]: 2025-03-17 19:41:23.655 [INFO][2693] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.67/32] ContainerID="da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.209-k8s-nfs--server--provisioner--0-eth0" Mar 17 19:41:23.713295 env[1158]: 2025-03-17 19:41:23.655 [INFO][2693] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.209-k8s-nfs--server--provisioner--0-eth0" Mar 17 19:41:23.713295 env[1158]: 2025-03-17 19:41:23.676 [INFO][2693] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.209-k8s-nfs--server--provisioner--0-eth0" Mar 17 19:41:23.713879 env[1158]: 2025-03-17 19:41:23.680 [INFO][2693] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.209-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ebe436e7-3429-4d18-a027-595b90975376", ResourceVersion:"1294", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 41, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.51.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"56:f4:22:f9:ae:d8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:23.713879 env[1158]: 2025-03-17 19:41:23.701 [INFO][2693] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.209-k8s-nfs--server--provisioner--0-eth0" Mar 17 19:41:23.746000 audit[2725]: NETFILTER_CFG table=filter:74 family=2 entries=38 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:41:23.746000 audit[2725]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffd016d8a90 a2=0 a3=7ffd016d8a7c items=0 ppid=2222 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.746000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:41:23.759839 env[1158]: time="2025-03-17T19:41:23.759677906Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:41:23.759839 env[1158]: time="2025-03-17T19:41:23.759755022Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:41:23.759839 env[1158]: time="2025-03-17T19:41:23.759769021Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:41:23.760195 env[1158]: time="2025-03-17T19:41:23.760118250Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11 pid=2733 runtime=io.containerd.runc.v2 Mar 17 19:41:23.784931 systemd[1]: Started cri-containerd-da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11.scope. Mar 17 19:41:23.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit: BPF prog-id=118 op=LOAD Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2733 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461326466623364666335366534333065316465653665626234376535 Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2733 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461326466623364666335366534333065316465653665626234376535 Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.801000 audit: BPF prog-id=119 op=LOAD Mar 17 19:41:23.801000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028bb20 items=0 ppid=2733 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461326466623364666335366534333065316465653665626234376535 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit: BPF prog-id=120 op=LOAD Mar 17 19:41:23.802000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028bb68 items=0 ppid=2733 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461326466623364666335366534333065316465653665626234376535 Mar 17 19:41:23.802000 audit: BPF prog-id=120 op=UNLOAD Mar 17 19:41:23.802000 audit: BPF prog-id=119 op=UNLOAD Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:23.802000 audit: BPF prog-id=121 op=LOAD Mar 17 19:41:23.802000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028bf78 items=0 ppid=2733 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:23.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461326466623364666335366534333065316465653665626234376535 Mar 17 19:41:23.828179 env[1158]: time="2025-03-17T19:41:23.828129905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ebe436e7-3429-4d18-a027-595b90975376,Namespace:default,Attempt:0,} returns sandbox id \"da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11\"" Mar 17 19:41:23.830456 env[1158]: time="2025-03-17T19:41:23.830420965Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Mar 17 19:41:24.206172 kubelet[1468]: E0317 19:41:24.206092 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:25.206515 kubelet[1468]: E0317 19:41:25.206279 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:25.257370 systemd-networkd[985]: cali60e51b789ff: Gained IPv6LL Mar 17 19:41:26.156924 kubelet[1468]: E0317 19:41:26.156790 1468 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:26.206269 env[1158]: time="2025-03-17T19:41:26.206189391Z" level=info msg="StopPodSandbox for \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\"" Mar 17 19:41:26.207429 kubelet[1468]: E0317 19:41:26.207371 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.325 [WARNING][2780] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-csi--node--driver--tttv8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c", ResourceVersion:"1232", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 40, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2", Pod:"csi-node-driver-tttv8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibb48dc148d2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.325 [INFO][2780] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.326 [INFO][2780] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" iface="eth0" netns="" Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.326 [INFO][2780] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.326 [INFO][2780] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.367 [INFO][2787] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" HandleID="k8s-pod-network.11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.367 [INFO][2787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.367 [INFO][2787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.382 [WARNING][2787] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" HandleID="k8s-pod-network.11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.383 [INFO][2787] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" HandleID="k8s-pod-network.11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.384 [INFO][2787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:41:26.387179 env[1158]: 2025-03-17 19:41:26.386 [INFO][2780] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:26.387756 env[1158]: time="2025-03-17T19:41:26.387211520Z" level=info msg="TearDown network for sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\" successfully" Mar 17 19:41:26.387756 env[1158]: time="2025-03-17T19:41:26.387249023Z" level=info msg="StopPodSandbox for \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\" returns successfully" Mar 17 19:41:26.387980 env[1158]: time="2025-03-17T19:41:26.387953067Z" level=info msg="RemovePodSandbox for \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\"" Mar 17 19:41:26.388043 env[1158]: time="2025-03-17T19:41:26.387989749Z" level=info msg="Forcibly stopping sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\"" Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.487 [WARNING][2805] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-csi--node--driver--tttv8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e04e57ec-b0e3-42db-8bc5-13ea4e9ddd5c", ResourceVersion:"1232", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 40, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"85d98f2158203b68f2881bb9625fac2dffa695f7ce8080113757d91a652237d2", Pod:"csi-node-driver-tttv8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibb48dc148d2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.487 [INFO][2805] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.487 [INFO][2805] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" iface="eth0" netns="" Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.487 [INFO][2805] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.487 [INFO][2805] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.515 [INFO][2813] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" HandleID="k8s-pod-network.11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.515 [INFO][2813] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.515 [INFO][2813] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.529 [WARNING][2813] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" HandleID="k8s-pod-network.11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.539 [INFO][2813] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" HandleID="k8s-pod-network.11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Workload="172.24.4.209-k8s-csi--node--driver--tttv8-eth0" Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.545 [INFO][2813] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:41:26.554560 env[1158]: 2025-03-17 19:41:26.550 [INFO][2805] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e" Mar 17 19:41:26.555180 env[1158]: time="2025-03-17T19:41:26.555148993Z" level=info msg="TearDown network for sandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\" successfully" Mar 17 19:41:27.155404 env[1158]: time="2025-03-17T19:41:27.155330935Z" level=info msg="RemovePodSandbox \"11f6f9d22be216478d678ca9b93ace720ea44ad59101fb56c494a29dbaff232e\" returns successfully" Mar 17 19:41:27.156733 env[1158]: time="2025-03-17T19:41:27.156672285Z" level=info msg="StopPodSandbox for \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\"" Mar 17 19:41:27.208943 kubelet[1468]: E0317 19:41:27.208766 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.289 [WARNING][2835] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"68b62776-b6da-47bb-8aed-a241b87efe8a", ResourceVersion:"1251", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504", Pod:"nginx-deployment-85f456d6dd-c87mw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7c074d7fbc8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.290 [INFO][2835] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.290 [INFO][2835] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" iface="eth0" netns="" Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.290 [INFO][2835] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.290 [INFO][2835] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.348 [INFO][2841] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" HandleID="k8s-pod-network.1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.349 [INFO][2841] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.349 [INFO][2841] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.358 [WARNING][2841] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" HandleID="k8s-pod-network.1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.358 [INFO][2841] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" HandleID="k8s-pod-network.1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.361 [INFO][2841] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:41:27.364160 env[1158]: 2025-03-17 19:41:27.363 [INFO][2835] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:27.365213 env[1158]: time="2025-03-17T19:41:27.365177264Z" level=info msg="TearDown network for sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\" successfully" Mar 17 19:41:27.365294 env[1158]: time="2025-03-17T19:41:27.365275143Z" level=info msg="StopPodSandbox for \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\" returns successfully" Mar 17 19:41:27.365911 env[1158]: time="2025-03-17T19:41:27.365889458Z" level=info msg="RemovePodSandbox for \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\"" Mar 17 19:41:27.366029 env[1158]: time="2025-03-17T19:41:27.365989580Z" level=info msg="Forcibly stopping sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\"" Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.523 [WARNING][2861] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"68b62776-b6da-47bb-8aed-a241b87efe8a", ResourceVersion:"1251", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"0cec8a485b681ea3d6ad0ee20b56961a5f86ecc731f48a4007bb196b26e67504", Pod:"nginx-deployment-85f456d6dd-c87mw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7c074d7fbc8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.523 [INFO][2861] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.523 [INFO][2861] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" iface="eth0" netns="" Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.523 [INFO][2861] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.523 [INFO][2861] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.582 [INFO][2867] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" HandleID="k8s-pod-network.1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.582 [INFO][2867] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.582 [INFO][2867] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.590 [WARNING][2867] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" HandleID="k8s-pod-network.1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.590 [INFO][2867] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" HandleID="k8s-pod-network.1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Workload="172.24.4.209-k8s-nginx--deployment--85f456d6dd--c87mw-eth0" Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.591 [INFO][2867] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:41:27.614121 env[1158]: 2025-03-17 19:41:27.592 [INFO][2861] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2" Mar 17 19:41:27.614755 env[1158]: time="2025-03-17T19:41:27.614723380Z" level=info msg="TearDown network for sandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\" successfully" Mar 17 19:41:27.634313 env[1158]: time="2025-03-17T19:41:27.634276325Z" level=info msg="RemovePodSandbox \"1c2181d555b360be58bb8e7004afe8b5d8620fd0b8c91bee9d27020bd61fffb2\" returns successfully" Mar 17 19:41:28.209960 kubelet[1468]: E0317 19:41:28.209842 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:29.031705 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount892357943.mount: Deactivated successfully. Mar 17 19:41:29.211771 kubelet[1468]: E0317 19:41:29.211657 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:30.212648 kubelet[1468]: E0317 19:41:30.212561 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:31.213573 kubelet[1468]: E0317 19:41:31.213422 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:32.213884 kubelet[1468]: E0317 19:41:32.213789 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:32.245371 env[1158]: time="2025-03-17T19:41:32.245303181Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:32.251723 env[1158]: time="2025-03-17T19:41:32.249570355Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:32.255876 env[1158]: time="2025-03-17T19:41:32.254423689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:32.258104 env[1158]: time="2025-03-17T19:41:32.258060109Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:32.260246 env[1158]: time="2025-03-17T19:41:32.260190807Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Mar 17 19:41:32.268046 env[1158]: time="2025-03-17T19:41:32.267979862Z" level=info msg="CreateContainer within sandbox \"da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Mar 17 19:41:32.292723 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1013873347.mount: Deactivated successfully. Mar 17 19:41:32.306658 env[1158]: time="2025-03-17T19:41:32.306593934Z" level=info msg="CreateContainer within sandbox \"da2dfb3dfc56e430e1dee6ebb47e570b83873d0a030c77a1923c626df7737e11\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"2006bb66c238cdd7d4b61f44f221de311c914d70516f7eff9138c25914466ca3\"" Mar 17 19:41:32.308193 env[1158]: time="2025-03-17T19:41:32.308144132Z" level=info msg="StartContainer for \"2006bb66c238cdd7d4b61f44f221de311c914d70516f7eff9138c25914466ca3\"" Mar 17 19:41:32.339523 systemd[1]: Started cri-containerd-2006bb66c238cdd7d4b61f44f221de311c914d70516f7eff9138c25914466ca3.scope. Mar 17 19:41:32.372853 kernel: kauditd_printk_skb: 62 callbacks suppressed Mar 17 19:41:32.372948 kernel: audit: type=1400 audit(1742240492.368:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.379572 kernel: audit: type=1400 audit(1742240492.368:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.379623 kernel: audit: type=1400 audit(1742240492.368:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.383711 kernel: audit: type=1400 audit(1742240492.368:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.392866 kernel: audit: type=1400 audit(1742240492.368:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.392912 kernel: audit: type=1400 audit(1742240492.368:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.402173 kernel: audit: type=1400 audit(1742240492.368:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.402230 kernel: audit: type=1400 audit(1742240492.368:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.411371 kernel: audit: type=1400 audit(1742240492.368:752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.411414 kernel: audit: type=1400 audit(1742240492.368:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.368000 audit: BPF prog-id=122 op=LOAD Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2733 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:32.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303662623636633233386364643764346236316634346632323164 Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2733 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:32.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303662623636633233386364643764346236316634346632323164 Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.375000 audit: BPF prog-id=123 op=LOAD Mar 17 19:41:32.375000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000335300 items=0 ppid=2733 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:32.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303662623636633233386364643764346236316634346632323164 Mar 17 19:41:32.387000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.387000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.387000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.387000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.387000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.387000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.387000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.387000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.387000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.387000 audit: BPF prog-id=124 op=LOAD Mar 17 19:41:32.387000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000335348 items=0 ppid=2733 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:32.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303662623636633233386364643764346236316634346632323164 Mar 17 19:41:32.397000 audit: BPF prog-id=124 op=UNLOAD Mar 17 19:41:32.397000 audit: BPF prog-id=123 op=UNLOAD Mar 17 19:41:32.397000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.397000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.397000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.397000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.397000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.397000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.397000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.397000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.397000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.397000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:32.397000 audit: BPF prog-id=125 op=LOAD Mar 17 19:41:32.397000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000335758 items=0 ppid=2733 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:32.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303662623636633233386364643764346236316634346632323164 Mar 17 19:41:32.436452 env[1158]: time="2025-03-17T19:41:32.436404236Z" level=info msg="StartContainer for \"2006bb66c238cdd7d4b61f44f221de311c914d70516f7eff9138c25914466ca3\" returns successfully" Mar 17 19:41:32.481000 audit[2913]: AVC avc: denied { search } for pid=2913 comm="rpcbind" name="crypto" dev="proc" ino=22548 scontext=system_u:system_r:svirt_lxc_net_t:s0:c526,c828 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 19:41:32.481000 audit[2913]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f50f30f00c0 a2=0 a3=0 items=0 ppid=2895 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c526,c828 key=(null) Mar 17 19:41:32.481000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Mar 17 19:41:32.548000 audit[2918]: AVC avc: denied { search } for pid=2918 comm="dbus-daemon" name="crypto" dev="proc" ino=22548 scontext=system_u:system_r:svirt_lxc_net_t:s0:c526,c828 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 19:41:32.548000 audit[2918]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f216421e0c0 a2=0 a3=0 items=0 ppid=2895 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c526,c828 key=(null) Mar 17 19:41:32.548000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 19:41:32.552000 audit[2919]: AVC avc: denied { watch } for pid=2919 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538696 scontext=system_u:system_r:svirt_lxc_net_t:s0:c526,c828 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c526,c828 tclass=dir permissive=0 Mar 17 19:41:32.552000 audit[2919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=564178cec6b0 a2=2c8 a3=7ffe8a38833c items=0 ppid=2895 pid=2919 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c526,c828 key=(null) Mar 17 19:41:32.552000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 19:41:32.556000 audit[2920]: AVC avc: denied { read } for pid=2920 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22639 scontext=system_u:system_r:svirt_lxc_net_t:s0:c526,c828 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Mar 17 19:41:32.556000 audit[2920]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f793c72c320 a1=80000 a2=d a3=7ffdbe0aa8c0 items=0 ppid=2895 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c526,c828 key=(null) Mar 17 19:41:32.556000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 19:41:32.558000 audit[2920]: AVC avc: denied { search } for pid=2920 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22548 scontext=system_u:system_r:svirt_lxc_net_t:s0:c526,c828 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 19:41:32.558000 audit[2920]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f793bc800c0 a2=0 a3=0 items=0 ppid=2895 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c526,c828 key=(null) Mar 17 19:41:32.558000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 19:41:32.772000 audit[2925]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:41:32.772000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffed9f613f0 a2=0 a3=7ffed9f613dc items=0 ppid=1692 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:32.772000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:41:32.780000 audit[2925]: NETFILTER_CFG table=nat:76 family=2 entries=106 op=nft_register_chain pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:41:32.780000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffed9f613f0 a2=0 a3=7ffed9f613dc items=0 ppid=1692 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:32.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:41:33.215634 kubelet[1468]: E0317 19:41:33.215585 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:33.290225 systemd[1]: run-containerd-runc-k8s.io-2006bb66c238cdd7d4b61f44f221de311c914d70516f7eff9138c25914466ca3-runc.vPPNEw.mount: Deactivated successfully. Mar 17 19:41:34.217099 kubelet[1468]: E0317 19:41:34.217045 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:35.218543 kubelet[1468]: E0317 19:41:35.218440 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:36.219353 kubelet[1468]: E0317 19:41:36.219304 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:37.220714 kubelet[1468]: E0317 19:41:37.220576 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:38.221357 kubelet[1468]: E0317 19:41:38.221149 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:39.222877 kubelet[1468]: E0317 19:41:39.222771 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:40.223798 kubelet[1468]: E0317 19:41:40.223733 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:41.224938 kubelet[1468]: E0317 19:41:41.224770 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:42.225579 kubelet[1468]: E0317 19:41:42.225493 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:43.227876 kubelet[1468]: E0317 19:41:43.227756 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:44.229102 kubelet[1468]: E0317 19:41:44.228998 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:44.713502 systemd[1]: run-containerd-runc-k8s.io-12bcf92438c9095fe8bfb9e84410fe608daa5626a82f78e98a2a046b1b364739-runc.sYemv1.mount: Deactivated successfully. Mar 17 19:41:45.230043 kubelet[1468]: E0317 19:41:45.229973 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:46.156410 kubelet[1468]: E0317 19:41:46.156362 1468 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:46.231317 kubelet[1468]: E0317 19:41:46.231275 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:47.232389 kubelet[1468]: E0317 19:41:47.232292 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:48.233377 kubelet[1468]: E0317 19:41:48.233316 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:49.234794 kubelet[1468]: E0317 19:41:49.234733 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:50.236224 kubelet[1468]: E0317 19:41:50.236170 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:51.237625 kubelet[1468]: E0317 19:41:51.237522 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:52.237988 kubelet[1468]: E0317 19:41:52.237923 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:53.239934 kubelet[1468]: E0317 19:41:53.239806 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:54.240867 kubelet[1468]: E0317 19:41:54.240758 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:55.242089 kubelet[1468]: E0317 19:41:55.241926 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:56.242645 kubelet[1468]: E0317 19:41:56.242522 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:57.242898 kubelet[1468]: E0317 19:41:57.242757 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:57.390657 kubelet[1468]: I0317 19:41:57.390550 1468 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=26.957822606 podStartE2EDuration="35.39051699s" podCreationTimestamp="2025-03-17 19:41:22 +0000 UTC" firstStartedPulling="2025-03-17 19:41:23.829682183 +0000 UTC m=+58.810557778" lastFinishedPulling="2025-03-17 19:41:32.262376527 +0000 UTC m=+67.243252162" observedRunningTime="2025-03-17 19:41:32.745505718 +0000 UTC m=+67.726381363" watchObservedRunningTime="2025-03-17 19:41:57.39051699 +0000 UTC m=+92.371392635" Mar 17 19:41:57.391285 kubelet[1468]: I0317 19:41:57.391239 1468 topology_manager.go:215] "Topology Admit Handler" podUID="aed13f53-d285-4bcf-85ec-9bcb3612c33c" podNamespace="default" podName="test-pod-1" Mar 17 19:41:57.405463 systemd[1]: Created slice kubepods-besteffort-podaed13f53_d285_4bcf_85ec_9bcb3612c33c.slice. Mar 17 19:41:57.438632 kubelet[1468]: I0317 19:41:57.438471 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-e1e79939-f0d2-432d-98c4-b4366fb4bd7d\" (UniqueName: \"kubernetes.io/nfs/aed13f53-d285-4bcf-85ec-9bcb3612c33c-pvc-e1e79939-f0d2-432d-98c4-b4366fb4bd7d\") pod \"test-pod-1\" (UID: \"aed13f53-d285-4bcf-85ec-9bcb3612c33c\") " pod="default/test-pod-1" Mar 17 19:41:57.438632 kubelet[1468]: I0317 19:41:57.438582 1468 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-scm5m\" (UniqueName: \"kubernetes.io/projected/aed13f53-d285-4bcf-85ec-9bcb3612c33c-kube-api-access-scm5m\") pod \"test-pod-1\" (UID: \"aed13f53-d285-4bcf-85ec-9bcb3612c33c\") " pod="default/test-pod-1" Mar 17 19:41:57.597452 kernel: Failed to create system directory netfs Mar 17 19:41:57.597742 kernel: kauditd_printk_skb: 68 callbacks suppressed Mar 17 19:41:57.597900 kernel: audit: type=1400 audit(1742240517.588:769): avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.588000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.616363 kernel: Failed to create system directory netfs Mar 17 19:41:57.616499 kernel: audit: type=1400 audit(1742240517.588:769): avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.588000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.631601 kernel: Failed to create system directory netfs Mar 17 19:41:57.631680 kernel: audit: type=1400 audit(1742240517.588:769): avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.588000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.639785 kernel: Failed to create system directory netfs Mar 17 19:41:57.639842 kernel: audit: type=1400 audit(1742240517.588:769): avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.588000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.588000 audit[2981]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55afd0cf05e0 a1=153bc a2=55afb92d22b0 a3=5 items=0 ppid=50 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:57.588000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 19:41:57.667113 kernel: audit: type=1300 audit(1742240517.588:769): arch=c000003e syscall=175 success=yes exit=0 a0=55afd0cf05e0 a1=153bc a2=55afb92d22b0 a3=5 items=0 ppid=50 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:57.667166 kernel: audit: type=1327 audit(1742240517.588:769): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 19:41:57.668634 kernel: Failed to create system directory fscache Mar 17 19:41:57.668677 kernel: audit: type=1400 audit(1742240517.661:770): avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.674942 kernel: Failed to create system directory fscache Mar 17 19:41:57.674984 kernel: audit: type=1400 audit(1742240517.661:770): avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.681251 kernel: Failed to create system directory fscache Mar 17 19:41:57.681296 kernel: audit: type=1400 audit(1742240517.661:770): avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.687618 kernel: Failed to create system directory fscache Mar 17 19:41:57.687662 kernel: audit: type=1400 audit(1742240517.661:770): avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.696281 kernel: Failed to create system directory fscache Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.698698 kernel: Failed to create system directory fscache Mar 17 19:41:57.698741 kernel: Failed to create system directory fscache Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.701236 kernel: Failed to create system directory fscache Mar 17 19:41:57.701279 kernel: Failed to create system directory fscache Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.703710 kernel: Failed to create system directory fscache Mar 17 19:41:57.703743 kernel: Failed to create system directory fscache Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.706139 kernel: Failed to create system directory fscache Mar 17 19:41:57.706177 kernel: Failed to create system directory fscache Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.661000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.708563 kernel: Failed to create system directory fscache Mar 17 19:41:57.710901 kernel: FS-Cache: Loaded Mar 17 19:41:57.661000 audit[2981]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55afd0f059c0 a1=4c0fc a2=55afb92d22b0 a3=5 items=0 ppid=50 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:57.661000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.755449 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.755584 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.755639 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.758194 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.758292 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.760733 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.760857 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.763299 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.763382 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.765961 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.766077 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.768549 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.768710 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.769882 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.772485 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.772604 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.773869 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.776419 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.776489 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.777704 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.779073 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.780278 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.781550 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.782854 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.784113 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.785401 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.786679 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.787978 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.789301 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.790534 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.791860 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.793092 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.794367 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.796639 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.798670 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.798858 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.799537 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.800785 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.803340 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.803417 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.804635 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.805917 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.807194 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.808509 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.809780 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.811051 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.812334 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.813604 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.814894 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.816231 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.817541 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.818873 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.820104 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.821377 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.822696 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.826541 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.826669 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.826725 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.827732 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.828962 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.831308 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.831425 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.832490 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.833747 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.834964 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.836243 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.837319 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.838537 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.839725 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.840983 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.842148 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.843381 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.846004 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.846139 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.847076 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.848281 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.855001 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.855159 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.855287 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.855341 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.855394 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.857461 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.857617 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.858937 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.859781 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.861150 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.862376 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.863582 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.864973 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.866293 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.867522 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.868860 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.870117 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.871442 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.872708 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.873991 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.875208 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.876406 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.877597 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.878911 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.881461 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.881587 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.884246 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.884438 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.886574 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.886715 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.889111 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.889294 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.890271 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.891624 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.892929 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.894228 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.896791 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.896928 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.899392 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.899612 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.900692 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.901961 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.904434 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.904573 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.906877 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.907020 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.909294 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.909418 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.911743 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.911899 kernel: Failed to create system directory sunrpc Mar 17 19:41:57.735000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.926887 kernel: RPC: Registered named UNIX socket transport module. Mar 17 19:41:57.927101 kernel: RPC: Registered udp transport module. Mar 17 19:41:57.927219 kernel: RPC: Registered tcp transport module. Mar 17 19:41:57.927924 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 17 19:41:57.735000 audit[2981]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55afd0f51ad0 a1=1a810c a2=55afb92d22b0 a3=5 items=6 ppid=50 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:57.735000 audit: CWD cwd="/" Mar 17 19:41:57.735000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:57.735000 audit: PATH item=1 name=(null) inode=23668 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:57.735000 audit: PATH item=2 name=(null) inode=23668 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:57.735000 audit: PATH item=3 name=(null) inode=23669 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:57.735000 audit: PATH item=4 name=(null) inode=23668 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:57.735000 audit: PATH item=5 name=(null) inode=23670 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:41:57.735000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.980937 kernel: Failed to create system directory nfs Mar 17 19:41:57.981067 kernel: Failed to create system directory nfs Mar 17 19:41:57.981171 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.983187 kernel: Failed to create system directory nfs Mar 17 19:41:57.983333 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.985547 kernel: Failed to create system directory nfs Mar 17 19:41:57.985683 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.987971 kernel: Failed to create system directory nfs Mar 17 19:41:57.988140 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.990263 kernel: Failed to create system directory nfs Mar 17 19:41:57.990406 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.991457 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.992650 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.993911 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.994984 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.996298 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.998629 kernel: Failed to create system directory nfs Mar 17 19:41:57.998779 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.000992 kernel: Failed to create system directory nfs Mar 17 19:41:58.001137 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.003259 kernel: Failed to create system directory nfs Mar 17 19:41:58.003380 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.005692 kernel: Failed to create system directory nfs Mar 17 19:41:58.005878 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.006953 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.009264 kernel: Failed to create system directory nfs Mar 17 19:41:58.009425 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.011607 kernel: Failed to create system directory nfs Mar 17 19:41:58.011749 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.013954 kernel: Failed to create system directory nfs Mar 17 19:41:58.014100 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.016295 kernel: Failed to create system directory nfs Mar 17 19:41:58.016420 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.017397 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.018629 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.020990 kernel: Failed to create system directory nfs Mar 17 19:41:58.021113 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.023280 kernel: Failed to create system directory nfs Mar 17 19:41:58.023402 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.028048 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.029154 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.030399 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.031549 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.032654 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.033900 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.036217 kernel: Failed to create system directory nfs Mar 17 19:41:58.036363 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.038642 kernel: Failed to create system directory nfs Mar 17 19:41:58.038783 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.039765 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.041045 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.043349 kernel: Failed to create system directory nfs Mar 17 19:41:58.043490 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.044807 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.045940 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.048454 kernel: Failed to create system directory nfs Mar 17 19:41:58.048581 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.050742 kernel: Failed to create system directory nfs Mar 17 19:41:58.050897 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.051922 kernel: Failed to create system directory nfs Mar 17 19:41:57.965000 audit[2981]: AVC avc: denied { confidentiality } for pid=2981 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.080522 kernel: FS-Cache: Netfs 'nfs' registered for caching Mar 17 19:41:57.965000 audit[2981]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55afd11729b0 a1=16ea84 a2=55afb92d22b0 a3=5 items=0 ppid=50 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:57.965000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.134088 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.134246 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.134307 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.134355 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.135455 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.136757 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.138168 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.140753 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.140904 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.142054 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.143353 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.145895 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.146072 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.148591 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.148722 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.151243 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.151379 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.152571 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.155014 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.155128 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.156255 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.157554 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.158914 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.161617 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.161758 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.164002 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.164155 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.165149 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.166386 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.167540 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.168944 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.171285 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.171429 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.173687 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.173804 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.174787 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.176060 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.177140 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.178429 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.179552 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.180881 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.183200 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.183317 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.184317 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.185567 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.186668 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.187976 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.190473 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.190592 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.193033 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.193157 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.195570 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.195714 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.198106 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.198222 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.200659 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.200794 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.201966 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.204548 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.204864 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.205702 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.206993 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.208187 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.209315 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.210661 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.211886 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.214321 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.214454 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.215491 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.216651 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.217977 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.220401 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.220520 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.221568 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.222676 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.223972 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.226279 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.226413 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.227453 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.228612 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.231044 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.231162 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.233433 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.233549 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.234527 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.235799 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.238450 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.238545 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.239600 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.240853 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.242135 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.243449 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.243681 kubelet[1468]: E0317 19:41:58.243354 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:58.244509 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.245599 kernel: Failed to create system directory nfs4 Mar 17 19:41:58.111000 audit[2986]: AVC avc: denied { confidentiality } for pid=2986 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.422237 kernel: NFS: Registering the id_resolver key type Mar 17 19:41:58.422449 kernel: Key type id_resolver registered Mar 17 19:41:58.422512 kernel: Key type id_legacy registered Mar 17 19:41:58.111000 audit[2986]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff271374010 a1=208d7c a2=563a105e82b0 a3=5 items=0 ppid=50 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:58.111000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.446222 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.446269 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.447605 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.448943 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.450279 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.451595 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.452987 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.454331 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.455648 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.457002 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.458405 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.459825 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.461240 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.462647 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.465554 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.465585 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.466944 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.468342 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.469672 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.470978 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.472311 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.473703 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.476328 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.476360 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.477666 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.478969 kernel: Failed to create system directory rpcgss Mar 17 19:41:58.438000 audit[2987]: AVC avc: denied { confidentiality } for pid=2987 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:41:58.438000 audit[2987]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa1d9c16010 a1=70b4c a2=55d1140372b0 a3=5 items=0 ppid=50 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:58.438000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Mar 17 19:41:58.525265 nfsidmap[2992]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Mar 17 19:41:58.533301 nfsidmap[2993]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Mar 17 19:41:58.546000 audit[1224]: AVC avc: denied { watch_reads } for pid=1224 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2543 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 19:41:58.546000 audit[1224]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562ebcd0b860 a2=10 a3=3e3f27b4ff4d3568 items=0 ppid=1 pid=1224 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:58.546000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 19:41:58.546000 audit[1224]: AVC avc: denied { watch_reads } for pid=1224 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2543 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 19:41:58.546000 audit[1224]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562ebcd0b860 a2=10 a3=3e3f27b4ff4d3568 items=0 ppid=1 pid=1224 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:58.546000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 19:41:58.546000 audit[1224]: AVC avc: denied { watch_reads } for pid=1224 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2543 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 19:41:58.546000 audit[1224]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562ebcd0b860 a2=10 a3=3e3f27b4ff4d3568 items=0 ppid=1 pid=1224 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:58.546000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 19:41:58.553000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2543 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 19:41:58.553000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2543 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 19:41:58.553000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2543 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 19:41:58.612386 env[1158]: time="2025-03-17T19:41:58.612286117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:aed13f53-d285-4bcf-85ec-9bcb3612c33c,Namespace:default,Attempt:0,}" Mar 17 19:41:58.875891 systemd-networkd[985]: cali5ec59c6bf6e: Link UP Mar 17 19:41:58.885622 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 19:41:58.885767 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Mar 17 19:41:58.889590 systemd-networkd[985]: cali5ec59c6bf6e: Gained carrier Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.730 [INFO][2994] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.209-k8s-test--pod--1-eth0 default aed13f53-d285-4bcf-85ec-9bcb3612c33c 1394 0 2025-03-17 19:41:25 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.209 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.209-k8s-test--pod--1-" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.730 [INFO][2994] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.209-k8s-test--pod--1-eth0" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.774 [INFO][3005] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" HandleID="k8s-pod-network.3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" Workload="172.24.4.209-k8s-test--pod--1-eth0" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.802 [INFO][3005] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" HandleID="k8s-pod-network.3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" Workload="172.24.4.209-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318ab0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.209", "pod":"test-pod-1", "timestamp":"2025-03-17 19:41:58.774866086 +0000 UTC"}, Hostname:"172.24.4.209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.802 [INFO][3005] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.803 [INFO][3005] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.803 [INFO][3005] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.209' Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.807 [INFO][3005] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" host="172.24.4.209" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.817 [INFO][3005] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.209" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.828 [INFO][3005] ipam/ipam.go 489: Trying affinity for 192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.832 [INFO][3005] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.837 [INFO][3005] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.64/26 host="172.24.4.209" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.838 [INFO][3005] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.64/26 handle="k8s-pod-network.3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" host="172.24.4.209" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.841 [INFO][3005] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3 Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.851 [INFO][3005] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.64/26 handle="k8s-pod-network.3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" host="172.24.4.209" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.864 [INFO][3005] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.68/26] block=192.168.51.64/26 handle="k8s-pod-network.3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" host="172.24.4.209" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.864 [INFO][3005] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.68/26] handle="k8s-pod-network.3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" host="172.24.4.209" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.864 [INFO][3005] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.864 [INFO][3005] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.68/26] IPv6=[] ContainerID="3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" HandleID="k8s-pod-network.3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" Workload="172.24.4.209-k8s-test--pod--1-eth0" Mar 17 19:41:58.911900 env[1158]: 2025-03-17 19:41:58.868 [INFO][2994] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.209-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"aed13f53-d285-4bcf-85ec-9bcb3612c33c", ResourceVersion:"1394", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 41, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:58.913554 env[1158]: 2025-03-17 19:41:58.868 [INFO][2994] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.68/32] ContainerID="3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.209-k8s-test--pod--1-eth0" Mar 17 19:41:58.913554 env[1158]: 2025-03-17 19:41:58.868 [INFO][2994] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.209-k8s-test--pod--1-eth0" Mar 17 19:41:58.913554 env[1158]: 2025-03-17 19:41:58.891 [INFO][2994] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.209-k8s-test--pod--1-eth0" Mar 17 19:41:58.913554 env[1158]: 2025-03-17 19:41:58.891 [INFO][2994] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.209-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.209-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"aed13f53-d285-4bcf-85ec-9bcb3612c33c", ResourceVersion:"1394", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 41, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.209", ContainerID:"3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"1a:33:9b:9f:01:f5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:41:58.913554 env[1158]: 2025-03-17 19:41:58.906 [INFO][2994] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.209-k8s-test--pod--1-eth0" Mar 17 19:41:58.940000 audit[3025]: NETFILTER_CFG table=filter:77 family=2 entries=38 op=nft_register_chain pid=3025 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:41:58.940000 audit[3025]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7fffcf81f590 a2=0 a3=7fffcf81f57c items=0 ppid=2222 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:58.940000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:41:58.954502 env[1158]: time="2025-03-17T19:41:58.954397113Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:41:58.954502 env[1158]: time="2025-03-17T19:41:58.954469213Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:41:58.954931 env[1158]: time="2025-03-17T19:41:58.954483948Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:41:58.954931 env[1158]: time="2025-03-17T19:41:58.954713992Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3 pid=3034 runtime=io.containerd.runc.v2 Mar 17 19:41:58.976830 systemd[1]: Started cri-containerd-3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3.scope. Mar 17 19:41:58.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.990000 audit: BPF prog-id=126 op=LOAD Mar 17 19:41:58.990000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.990000 audit[3042]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3034 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:58.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366163323035646563636265356364623436386432613334383733 Mar 17 19:41:58.990000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.990000 audit[3042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3034 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:58.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366163323035646563636265356364623436386432613334383733 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit: BPF prog-id=127 op=LOAD Mar 17 19:41:58.991000 audit[3042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025710 items=0 ppid=3034 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:58.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366163323035646563636265356364623436386432613334383733 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.991000 audit: BPF prog-id=128 op=LOAD Mar 17 19:41:58.991000 audit[3042]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025758 items=0 ppid=3034 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:58.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366163323035646563636265356364623436386432613334383733 Mar 17 19:41:58.992000 audit: BPF prog-id=128 op=UNLOAD Mar 17 19:41:58.992000 audit: BPF prog-id=127 op=UNLOAD Mar 17 19:41:58.992000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.992000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.992000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.992000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.992000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.992000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.992000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.992000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.992000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.992000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:58.992000 audit: BPF prog-id=129 op=LOAD Mar 17 19:41:58.992000 audit[3042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025b68 items=0 ppid=3034 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:58.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366163323035646563636265356364623436386432613334383733 Mar 17 19:41:59.020526 env[1158]: time="2025-03-17T19:41:59.020483372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:aed13f53-d285-4bcf-85ec-9bcb3612c33c,Namespace:default,Attempt:0,} returns sandbox id \"3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3\"" Mar 17 19:41:59.022296 env[1158]: time="2025-03-17T19:41:59.022266000Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 19:41:59.248933 kubelet[1468]: E0317 19:41:59.244390 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:41:59.513316 env[1158]: time="2025-03-17T19:41:59.513142997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:59.517063 env[1158]: time="2025-03-17T19:41:59.517009729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:59.522234 env[1158]: time="2025-03-17T19:41:59.522160053Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:59.527159 env[1158]: time="2025-03-17T19:41:59.527056180Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:41:59.530748 env[1158]: time="2025-03-17T19:41:59.530653671Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee\"" Mar 17 19:41:59.536960 env[1158]: time="2025-03-17T19:41:59.536894683Z" level=info msg="CreateContainer within sandbox \"3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3\" for container &ContainerMetadata{Name:test,Attempt:0,}" Mar 17 19:41:59.563975 env[1158]: time="2025-03-17T19:41:59.563876604Z" level=info msg="CreateContainer within sandbox \"3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"0507f5165fe1c04c558730e90cfde6bc4e214d97d5f00609162e67b61aaca867\"" Mar 17 19:41:59.565395 env[1158]: time="2025-03-17T19:41:59.565338726Z" level=info msg="StartContainer for \"0507f5165fe1c04c558730e90cfde6bc4e214d97d5f00609162e67b61aaca867\"" Mar 17 19:41:59.600618 systemd[1]: Started cri-containerd-0507f5165fe1c04c558730e90cfde6bc4e214d97d5f00609162e67b61aaca867.scope. Mar 17 19:41:59.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.629000 audit: BPF prog-id=130 op=LOAD Mar 17 19:41:59.638254 systemd[1]: run-containerd-runc-k8s.io-3b6ac205deccbe5cdb468d2a34873850635190f6c54c2ad3dc842a84da9a02b3-runc.YKGees.mount: Deactivated successfully. Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3034 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:59.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303766353136356665316330346335353837333065393063666465 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=3034 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:59.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303766353136356665316330346335353837333065393063666465 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit: BPF prog-id=131 op=LOAD Mar 17 19:41:59.640000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0002971d0 items=0 ppid=3034 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:59.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303766353136356665316330346335353837333065393063666465 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit: BPF prog-id=132 op=LOAD Mar 17 19:41:59.640000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000297218 items=0 ppid=3034 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:59.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303766353136356665316330346335353837333065393063666465 Mar 17 19:41:59.640000 audit: BPF prog-id=132 op=UNLOAD Mar 17 19:41:59.640000 audit: BPF prog-id=131 op=UNLOAD Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:41:59.640000 audit: BPF prog-id=133 op=LOAD Mar 17 19:41:59.640000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000297628 items=0 ppid=3034 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:41:59.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303766353136356665316330346335353837333065393063666465 Mar 17 19:41:59.669247 env[1158]: time="2025-03-17T19:41:59.669134643Z" level=info msg="StartContainer for \"0507f5165fe1c04c558730e90cfde6bc4e214d97d5f00609162e67b61aaca867\" returns successfully" Mar 17 19:41:59.833964 kubelet[1468]: I0317 19:41:59.833693 1468 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=34.322234949 podStartE2EDuration="34.833660374s" podCreationTimestamp="2025-03-17 19:41:25 +0000 UTC" firstStartedPulling="2025-03-17 19:41:59.021833825 +0000 UTC m=+94.002709430" lastFinishedPulling="2025-03-17 19:41:59.533259219 +0000 UTC m=+94.514134855" observedRunningTime="2025-03-17 19:41:59.833293028 +0000 UTC m=+94.814168673" watchObservedRunningTime="2025-03-17 19:41:59.833660374 +0000 UTC m=+94.814536019" Mar 17 19:42:00.245293 kubelet[1468]: E0317 19:42:00.245026 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:00.827890 systemd-networkd[985]: cali5ec59c6bf6e: Gained IPv6LL Mar 17 19:42:01.246168 kubelet[1468]: E0317 19:42:01.245994 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:02.247235 kubelet[1468]: E0317 19:42:02.247083 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:03.249170 kubelet[1468]: E0317 19:42:03.249107 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:04.250886 kubelet[1468]: E0317 19:42:04.250786 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:05.253049 kubelet[1468]: E0317 19:42:05.252914 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:06.157474 kubelet[1468]: E0317 19:42:06.157394 1468 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:06.253674 kubelet[1468]: E0317 19:42:06.253630 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:07.255879 kubelet[1468]: E0317 19:42:07.255676 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:08.256024 kubelet[1468]: E0317 19:42:08.255950 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:09.257063 kubelet[1468]: E0317 19:42:09.256926 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:10.258032 kubelet[1468]: E0317 19:42:10.257954 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:11.259213 kubelet[1468]: E0317 19:42:11.259148 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:12.260066 kubelet[1468]: E0317 19:42:12.259997 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 19:42:13.262256 kubelet[1468]: E0317 19:42:13.262112 1468 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"