Mar 17 18:46:46.821000 kernel: Linux version 5.15.179-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Mar 17 17:12:34 -00 2025 Mar 17 18:46:46.821018 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:46:46.821027 kernel: BIOS-provided physical RAM map: Mar 17 18:46:46.821033 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Mar 17 18:46:46.821038 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Mar 17 18:46:46.821044 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Mar 17 18:46:46.821050 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Mar 17 18:46:46.821056 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Mar 17 18:46:46.821061 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Mar 17 18:46:46.821068 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Mar 17 18:46:46.821073 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Mar 17 18:46:46.821079 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Mar 17 18:46:46.821084 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Mar 17 18:46:46.821090 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Mar 17 18:46:46.821097 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Mar 17 18:46:46.821103 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Mar 17 18:46:46.821109 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Mar 17 18:46:46.821115 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Mar 17 18:46:46.821121 kernel: NX (Execute Disable) protection: active Mar 17 18:46:46.821126 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Mar 17 18:46:46.821132 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Mar 17 18:46:46.821138 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Mar 17 18:46:46.821144 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Mar 17 18:46:46.821149 kernel: extended physical RAM map: Mar 17 18:46:46.821155 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Mar 17 18:46:46.821162 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Mar 17 18:46:46.821168 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Mar 17 18:46:46.821173 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Mar 17 18:46:46.821179 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Mar 17 18:46:46.821185 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Mar 17 18:46:46.821191 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Mar 17 18:46:46.821197 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Mar 17 18:46:46.821202 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Mar 17 18:46:46.821208 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Mar 17 18:46:46.821214 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Mar 17 18:46:46.821219 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Mar 17 18:46:46.821226 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Mar 17 18:46:46.821232 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Mar 17 18:46:46.821238 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Mar 17 18:46:46.821244 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Mar 17 18:46:46.821252 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Mar 17 18:46:46.821258 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Mar 17 18:46:46.821265 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Mar 17 18:46:46.821272 kernel: efi: EFI v2.70 by EDK II Mar 17 18:46:46.821278 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Mar 17 18:46:46.821284 kernel: random: crng init done Mar 17 18:46:46.821291 kernel: SMBIOS 2.8 present. Mar 17 18:46:46.821297 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Mar 17 18:46:46.821303 kernel: Hypervisor detected: KVM Mar 17 18:46:46.821309 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Mar 17 18:46:46.821315 kernel: kvm-clock: cpu 0, msr 1d19a001, primary cpu clock Mar 17 18:46:46.821322 kernel: kvm-clock: using sched offset of 4004008728 cycles Mar 17 18:46:46.821330 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Mar 17 18:46:46.821337 kernel: tsc: Detected 2794.748 MHz processor Mar 17 18:46:46.821343 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 17 18:46:46.821350 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 17 18:46:46.821356 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Mar 17 18:46:46.821363 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 17 18:46:46.821369 kernel: Using GB pages for direct mapping Mar 17 18:46:46.821376 kernel: Secure boot disabled Mar 17 18:46:46.821382 kernel: ACPI: Early table checksum verification disabled Mar 17 18:46:46.821389 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Mar 17 18:46:46.821396 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Mar 17 18:46:46.821402 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:46:46.821409 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:46:46.821415 kernel: ACPI: FACS 0x000000009CBDD000 000040 Mar 17 18:46:46.821421 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:46:46.821428 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:46:46.821434 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:46:46.821441 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:46:46.821448 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Mar 17 18:46:46.821454 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Mar 17 18:46:46.821461 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] Mar 17 18:46:46.821467 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Mar 17 18:46:46.821473 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Mar 17 18:46:46.821480 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Mar 17 18:46:46.821486 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Mar 17 18:46:46.821492 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Mar 17 18:46:46.821499 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Mar 17 18:46:46.821506 kernel: No NUMA configuration found Mar 17 18:46:46.821513 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Mar 17 18:46:46.821519 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Mar 17 18:46:46.821526 kernel: Zone ranges: Mar 17 18:46:46.821532 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 17 18:46:46.821539 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Mar 17 18:46:46.821545 kernel: Normal empty Mar 17 18:46:46.821551 kernel: Movable zone start for each node Mar 17 18:46:46.821558 kernel: Early memory node ranges Mar 17 18:46:46.821565 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Mar 17 18:46:46.821579 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Mar 17 18:46:46.821586 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Mar 17 18:46:46.821592 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Mar 17 18:46:46.821598 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Mar 17 18:46:46.821605 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Mar 17 18:46:46.821611 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Mar 17 18:46:46.821617 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 17 18:46:46.821624 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Mar 17 18:46:46.821630 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Mar 17 18:46:46.821637 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 17 18:46:46.821644 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Mar 17 18:46:46.821650 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Mar 17 18:46:46.821667 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Mar 17 18:46:46.821674 kernel: ACPI: PM-Timer IO Port: 0x608 Mar 17 18:46:46.821680 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Mar 17 18:46:46.821687 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Mar 17 18:46:46.821693 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 17 18:46:46.821700 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Mar 17 18:46:46.821708 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 17 18:46:46.821714 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Mar 17 18:46:46.821721 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Mar 17 18:46:46.821727 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 17 18:46:46.821734 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Mar 17 18:46:46.821740 kernel: TSC deadline timer available Mar 17 18:46:46.821747 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Mar 17 18:46:46.821753 kernel: kvm-guest: KVM setup pv remote TLB flush Mar 17 18:46:46.821759 kernel: kvm-guest: setup PV sched yield Mar 17 18:46:46.821767 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Mar 17 18:46:46.821773 kernel: Booting paravirtualized kernel on KVM Mar 17 18:46:46.821784 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Mar 17 18:46:46.821791 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Mar 17 18:46:46.821798 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Mar 17 18:46:46.821805 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Mar 17 18:46:46.821811 kernel: pcpu-alloc: [0] 0 1 2 3 Mar 17 18:46:46.821818 kernel: kvm-guest: setup async PF for cpu 0 Mar 17 18:46:46.821825 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Mar 17 18:46:46.821831 kernel: kvm-guest: PV spinlocks enabled Mar 17 18:46:46.821838 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Mar 17 18:46:46.821845 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Mar 17 18:46:46.821853 kernel: Policy zone: DMA32 Mar 17 18:46:46.821861 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:46:46.821868 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Mar 17 18:46:46.821875 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Mar 17 18:46:46.821882 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 17 18:46:46.821889 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 17 18:46:46.821896 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2278K rwdata, 13724K rodata, 47472K init, 4108K bss, 169308K reserved, 0K cma-reserved) Mar 17 18:46:46.821903 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Mar 17 18:46:46.821910 kernel: ftrace: allocating 34580 entries in 136 pages Mar 17 18:46:46.821917 kernel: ftrace: allocated 136 pages with 2 groups Mar 17 18:46:46.821924 kernel: rcu: Hierarchical RCU implementation. Mar 17 18:46:46.821931 kernel: rcu: RCU event tracing is enabled. Mar 17 18:46:46.821938 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Mar 17 18:46:46.821945 kernel: Rude variant of Tasks RCU enabled. Mar 17 18:46:46.821952 kernel: Tracing variant of Tasks RCU enabled. Mar 17 18:46:46.821959 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 17 18:46:46.821966 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Mar 17 18:46:46.821973 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Mar 17 18:46:46.821979 kernel: Console: colour dummy device 80x25 Mar 17 18:46:46.821986 kernel: printk: console [ttyS0] enabled Mar 17 18:46:46.821993 kernel: ACPI: Core revision 20210730 Mar 17 18:46:46.822000 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Mar 17 18:46:46.822008 kernel: APIC: Switch to symmetric I/O mode setup Mar 17 18:46:46.822014 kernel: x2apic enabled Mar 17 18:46:46.822021 kernel: Switched APIC routing to physical x2apic. Mar 17 18:46:46.822028 kernel: kvm-guest: setup PV IPIs Mar 17 18:46:46.822035 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Mar 17 18:46:46.822041 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Mar 17 18:46:46.822048 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Mar 17 18:46:46.822055 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Mar 17 18:46:46.822062 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Mar 17 18:46:46.822069 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Mar 17 18:46:46.822076 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 17 18:46:46.822083 kernel: Spectre V2 : Mitigation: Retpolines Mar 17 18:46:46.822090 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 17 18:46:46.822097 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 17 18:46:46.822104 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Mar 17 18:46:46.822110 kernel: RETBleed: Mitigation: untrained return thunk Mar 17 18:46:46.822117 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 17 18:46:46.822124 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Mar 17 18:46:46.822132 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 17 18:46:46.822139 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 17 18:46:46.822145 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 17 18:46:46.822152 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 17 18:46:46.822159 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Mar 17 18:46:46.822166 kernel: Freeing SMP alternatives memory: 32K Mar 17 18:46:46.822173 kernel: pid_max: default: 32768 minimum: 301 Mar 17 18:46:46.822179 kernel: LSM: Security Framework initializing Mar 17 18:46:46.822186 kernel: SELinux: Initializing. Mar 17 18:46:46.822194 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Mar 17 18:46:46.822200 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Mar 17 18:46:46.822207 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Mar 17 18:46:46.822214 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Mar 17 18:46:46.822221 kernel: ... version: 0 Mar 17 18:46:46.822228 kernel: ... bit width: 48 Mar 17 18:46:46.822234 kernel: ... generic registers: 6 Mar 17 18:46:46.822241 kernel: ... value mask: 0000ffffffffffff Mar 17 18:46:46.822248 kernel: ... max period: 00007fffffffffff Mar 17 18:46:46.822255 kernel: ... fixed-purpose events: 0 Mar 17 18:46:46.822262 kernel: ... event mask: 000000000000003f Mar 17 18:46:46.822269 kernel: signal: max sigframe size: 1776 Mar 17 18:46:46.822275 kernel: rcu: Hierarchical SRCU implementation. Mar 17 18:46:46.822282 kernel: smp: Bringing up secondary CPUs ... Mar 17 18:46:46.822289 kernel: x86: Booting SMP configuration: Mar 17 18:46:46.822295 kernel: .... node #0, CPUs: #1 Mar 17 18:46:46.822302 kernel: kvm-clock: cpu 1, msr 1d19a041, secondary cpu clock Mar 17 18:46:46.822309 kernel: kvm-guest: setup async PF for cpu 1 Mar 17 18:46:46.822316 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Mar 17 18:46:46.822323 kernel: #2 Mar 17 18:46:46.822330 kernel: kvm-clock: cpu 2, msr 1d19a081, secondary cpu clock Mar 17 18:46:46.822337 kernel: kvm-guest: setup async PF for cpu 2 Mar 17 18:46:46.822343 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Mar 17 18:46:46.822350 kernel: #3 Mar 17 18:46:46.822357 kernel: kvm-clock: cpu 3, msr 1d19a0c1, secondary cpu clock Mar 17 18:46:46.822363 kernel: kvm-guest: setup async PF for cpu 3 Mar 17 18:46:46.822370 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Mar 17 18:46:46.822377 kernel: smp: Brought up 1 node, 4 CPUs Mar 17 18:46:46.822384 kernel: smpboot: Max logical packages: 1 Mar 17 18:46:46.822391 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Mar 17 18:46:46.822397 kernel: devtmpfs: initialized Mar 17 18:46:46.822404 kernel: x86/mm: Memory block size: 128MB Mar 17 18:46:46.822411 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Mar 17 18:46:46.822418 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Mar 17 18:46:46.822425 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Mar 17 18:46:46.822431 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Mar 17 18:46:46.822438 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Mar 17 18:46:46.822446 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 17 18:46:46.822453 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Mar 17 18:46:46.822460 kernel: pinctrl core: initialized pinctrl subsystem Mar 17 18:46:46.822467 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 17 18:46:46.822474 kernel: audit: initializing netlink subsys (disabled) Mar 17 18:46:46.822480 kernel: audit: type=2000 audit(1742237206.194:1): state=initialized audit_enabled=0 res=1 Mar 17 18:46:46.822487 kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 17 18:46:46.822494 kernel: thermal_sys: Registered thermal governor 'user_space' Mar 17 18:46:46.822501 kernel: cpuidle: using governor menu Mar 17 18:46:46.822508 kernel: ACPI: bus type PCI registered Mar 17 18:46:46.822515 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 17 18:46:46.822522 kernel: dca service started, version 1.12.1 Mar 17 18:46:46.822529 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Mar 17 18:46:46.822536 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Mar 17 18:46:46.822543 kernel: PCI: Using configuration type 1 for base access Mar 17 18:46:46.822554 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 17 18:46:46.822561 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Mar 17 18:46:46.822574 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Mar 17 18:46:46.822582 kernel: ACPI: Added _OSI(Module Device) Mar 17 18:46:46.822588 kernel: ACPI: Added _OSI(Processor Device) Mar 17 18:46:46.822596 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 17 18:46:46.822603 kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 17 18:46:46.822609 kernel: ACPI: Added _OSI(Linux-Dell-Video) Mar 17 18:46:46.822616 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Mar 17 18:46:46.822623 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Mar 17 18:46:46.822630 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Mar 17 18:46:46.822636 kernel: ACPI: Interpreter enabled Mar 17 18:46:46.822644 kernel: ACPI: PM: (supports S0 S3 S5) Mar 17 18:46:46.822651 kernel: ACPI: Using IOAPIC for interrupt routing Mar 17 18:46:46.822680 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 17 18:46:46.822687 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Mar 17 18:46:46.822694 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Mar 17 18:46:46.822798 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Mar 17 18:46:46.822870 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Mar 17 18:46:46.822939 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Mar 17 18:46:46.822948 kernel: PCI host bridge to bus 0000:00 Mar 17 18:46:46.823019 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 17 18:46:46.823081 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 17 18:46:46.823142 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Mar 17 18:46:46.823202 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Mar 17 18:46:46.823262 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Mar 17 18:46:46.823324 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Mar 17 18:46:46.823385 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Mar 17 18:46:46.823462 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Mar 17 18:46:46.823538 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Mar 17 18:46:46.823617 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Mar 17 18:46:46.823721 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Mar 17 18:46:46.823793 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Mar 17 18:46:46.823938 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Mar 17 18:46:46.824050 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 17 18:46:46.824149 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Mar 17 18:46:46.824226 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Mar 17 18:46:46.824309 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Mar 17 18:46:46.824420 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Mar 17 18:46:46.824508 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Mar 17 18:46:46.824600 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Mar 17 18:46:46.824686 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Mar 17 18:46:46.824754 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Mar 17 18:46:46.824828 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Mar 17 18:46:46.824896 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Mar 17 18:46:46.824963 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Mar 17 18:46:46.825032 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Mar 17 18:46:46.825098 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Mar 17 18:46:46.825170 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Mar 17 18:46:46.825237 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Mar 17 18:46:46.825316 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Mar 17 18:46:46.825398 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Mar 17 18:46:46.825475 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Mar 17 18:46:46.825553 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Mar 17 18:46:46.825628 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Mar 17 18:46:46.825638 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Mar 17 18:46:46.825646 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 17 18:46:46.825654 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 17 18:46:46.825678 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 17 18:46:46.825685 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Mar 17 18:46:46.825692 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Mar 17 18:46:46.825702 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Mar 17 18:46:46.825709 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Mar 17 18:46:46.825716 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Mar 17 18:46:46.825724 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Mar 17 18:46:46.825731 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Mar 17 18:46:46.825739 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Mar 17 18:46:46.825746 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Mar 17 18:46:46.825753 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Mar 17 18:46:46.825760 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Mar 17 18:46:46.825768 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Mar 17 18:46:46.825775 kernel: iommu: Default domain type: Translated Mar 17 18:46:46.825782 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 17 18:46:46.825852 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Mar 17 18:46:46.825919 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 17 18:46:46.825986 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Mar 17 18:46:46.825995 kernel: vgaarb: loaded Mar 17 18:46:46.826003 kernel: pps_core: LinuxPPS API ver. 1 registered Mar 17 18:46:46.826010 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 17 18:46:46.826020 kernel: PTP clock support registered Mar 17 18:46:46.826027 kernel: Registered efivars operations Mar 17 18:46:46.826034 kernel: PCI: Using ACPI for IRQ routing Mar 17 18:46:46.826041 kernel: PCI: pci_cache_line_size set to 64 bytes Mar 17 18:46:46.826049 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Mar 17 18:46:46.826060 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Mar 17 18:46:46.826067 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Mar 17 18:46:46.826074 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Mar 17 18:46:46.826081 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Mar 17 18:46:46.826090 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Mar 17 18:46:46.826097 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Mar 17 18:46:46.826104 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Mar 17 18:46:46.826119 kernel: clocksource: Switched to clocksource kvm-clock Mar 17 18:46:46.826126 kernel: VFS: Disk quotas dquot_6.6.0 Mar 17 18:46:46.826137 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 17 18:46:46.826144 kernel: pnp: PnP ACPI init Mar 17 18:46:46.826223 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Mar 17 18:46:46.826247 kernel: pnp: PnP ACPI: found 6 devices Mar 17 18:46:46.826255 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 17 18:46:46.826262 kernel: NET: Registered PF_INET protocol family Mar 17 18:46:46.826269 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Mar 17 18:46:46.826277 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Mar 17 18:46:46.826284 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 17 18:46:46.826291 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 17 18:46:46.826298 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Mar 17 18:46:46.826307 kernel: TCP: Hash tables configured (established 32768 bind 32768) Mar 17 18:46:46.826315 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Mar 17 18:46:46.826322 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Mar 17 18:46:46.826329 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 17 18:46:46.826336 kernel: NET: Registered PF_XDP protocol family Mar 17 18:46:46.826423 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Mar 17 18:46:46.826508 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Mar 17 18:46:46.826599 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 17 18:46:46.826703 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 17 18:46:46.826768 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Mar 17 18:46:46.826829 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Mar 17 18:46:46.826888 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Mar 17 18:46:46.826947 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Mar 17 18:46:46.826956 kernel: PCI: CLS 0 bytes, default 64 Mar 17 18:46:46.826963 kernel: Initialise system trusted keyrings Mar 17 18:46:46.826971 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Mar 17 18:46:46.826978 kernel: Key type asymmetric registered Mar 17 18:46:46.826987 kernel: Asymmetric key parser 'x509' registered Mar 17 18:46:46.826995 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Mar 17 18:46:46.827014 kernel: io scheduler mq-deadline registered Mar 17 18:46:46.827023 kernel: io scheduler kyber registered Mar 17 18:46:46.827031 kernel: io scheduler bfq registered Mar 17 18:46:46.827038 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Mar 17 18:46:46.827046 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Mar 17 18:46:46.827054 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Mar 17 18:46:46.827062 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Mar 17 18:46:46.827073 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 17 18:46:46.827081 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Mar 17 18:46:46.827090 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Mar 17 18:46:46.827098 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 17 18:46:46.827105 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 17 18:46:46.827190 kernel: rtc_cmos 00:04: RTC can wake from S4 Mar 17 18:46:46.827202 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Mar 17 18:46:46.827262 kernel: rtc_cmos 00:04: registered as rtc0 Mar 17 18:46:46.827326 kernel: rtc_cmos 00:04: setting system clock to 2025-03-17T18:46:46 UTC (1742237206) Mar 17 18:46:46.827386 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Mar 17 18:46:46.827396 kernel: efifb: probing for efifb Mar 17 18:46:46.827403 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Mar 17 18:46:46.827411 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Mar 17 18:46:46.827419 kernel: efifb: scrolling: redraw Mar 17 18:46:46.827426 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Mar 17 18:46:46.827433 kernel: Console: switching to colour frame buffer device 160x50 Mar 17 18:46:46.827441 kernel: fb0: EFI VGA frame buffer device Mar 17 18:46:46.827450 kernel: pstore: Registered efi as persistent store backend Mar 17 18:46:46.827458 kernel: NET: Registered PF_INET6 protocol family Mar 17 18:46:46.827466 kernel: Segment Routing with IPv6 Mar 17 18:46:46.827474 kernel: In-situ OAM (IOAM) with IPv6 Mar 17 18:46:46.827481 kernel: NET: Registered PF_PACKET protocol family Mar 17 18:46:46.827489 kernel: Key type dns_resolver registered Mar 17 18:46:46.827497 kernel: IPI shorthand broadcast: enabled Mar 17 18:46:46.827505 kernel: sched_clock: Marking stable (415234720, 128949638)->(590041358, -45857000) Mar 17 18:46:46.827513 kernel: registered taskstats version 1 Mar 17 18:46:46.827520 kernel: Loading compiled-in X.509 certificates Mar 17 18:46:46.827528 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.179-flatcar: d5b956bbabb2d386c0246a969032c0de9eaa8220' Mar 17 18:46:46.827535 kernel: Key type .fscrypt registered Mar 17 18:46:46.827542 kernel: Key type fscrypt-provisioning registered Mar 17 18:46:46.827549 kernel: pstore: Using crash dump compression: deflate Mar 17 18:46:46.827558 kernel: ima: No TPM chip found, activating TPM-bypass! Mar 17 18:46:46.827565 kernel: ima: Allocated hash algorithm: sha1 Mar 17 18:46:46.827580 kernel: ima: No architecture policies found Mar 17 18:46:46.827587 kernel: clk: Disabling unused clocks Mar 17 18:46:46.827595 kernel: Freeing unused kernel image (initmem) memory: 47472K Mar 17 18:46:46.827602 kernel: Write protecting the kernel read-only data: 28672k Mar 17 18:46:46.827610 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Mar 17 18:46:46.827619 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Mar 17 18:46:46.827626 kernel: Run /init as init process Mar 17 18:46:46.827634 kernel: with arguments: Mar 17 18:46:46.827642 kernel: /init Mar 17 18:46:46.827649 kernel: with environment: Mar 17 18:46:46.827657 kernel: HOME=/ Mar 17 18:46:46.827674 kernel: TERM=linux Mar 17 18:46:46.827684 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Mar 17 18:46:46.827694 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:46:46.827705 systemd[1]: Detected virtualization kvm. Mar 17 18:46:46.827715 systemd[1]: Detected architecture x86-64. Mar 17 18:46:46.827723 systemd[1]: Running in initrd. Mar 17 18:46:46.827731 systemd[1]: No hostname configured, using default hostname. Mar 17 18:46:46.827739 systemd[1]: Hostname set to . Mar 17 18:46:46.827747 systemd[1]: Initializing machine ID from VM UUID. Mar 17 18:46:46.827763 systemd[1]: Queued start job for default target initrd.target. Mar 17 18:46:46.827771 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:46:46.827779 systemd[1]: Reached target cryptsetup.target. Mar 17 18:46:46.827786 systemd[1]: Reached target paths.target. Mar 17 18:46:46.827796 systemd[1]: Reached target slices.target. Mar 17 18:46:46.827803 systemd[1]: Reached target swap.target. Mar 17 18:46:46.827811 systemd[1]: Reached target timers.target. Mar 17 18:46:46.827819 systemd[1]: Listening on iscsid.socket. Mar 17 18:46:46.827827 systemd[1]: Listening on iscsiuio.socket. Mar 17 18:46:46.827835 systemd[1]: Listening on systemd-journald-audit.socket. Mar 17 18:46:46.827843 systemd[1]: Listening on systemd-journald-dev-log.socket. Mar 17 18:46:46.827852 systemd[1]: Listening on systemd-journald.socket. Mar 17 18:46:46.827859 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:46:46.827867 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:46:46.827875 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:46:46.827882 systemd[1]: Reached target sockets.target. Mar 17 18:46:46.827890 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:46:46.827898 systemd[1]: Finished network-cleanup.service. Mar 17 18:46:46.827905 systemd[1]: Starting systemd-fsck-usr.service... Mar 17 18:46:46.827913 systemd[1]: Starting systemd-journald.service... Mar 17 18:46:46.827923 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:46:46.827930 systemd[1]: Starting systemd-resolved.service... Mar 17 18:46:46.827938 systemd[1]: Starting systemd-vconsole-setup.service... Mar 17 18:46:46.827946 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:46:46.827953 systemd[1]: Finished systemd-fsck-usr.service. Mar 17 18:46:46.827961 systemd[1]: Finished systemd-vconsole-setup.service. Mar 17 18:46:46.827969 kernel: audit: type=1130 audit(1742237206.820:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.827977 systemd[1]: Starting dracut-cmdline-ask.service... Mar 17 18:46:46.827985 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 18:46:46.827998 systemd-journald[198]: Journal started Mar 17 18:46:46.828042 systemd-journald[198]: Runtime Journal (/run/log/journal/5e051628b02348449e8a138f8de19fe7) is 6.0M, max 48.4M, 42.4M free. Mar 17 18:46:46.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.817181 systemd-modules-load[199]: Inserted module 'overlay' Mar 17 18:46:46.833727 systemd[1]: Started systemd-journald.service. Mar 17 18:46:46.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.834950 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 18:46:46.838284 kernel: audit: type=1130 audit(1742237206.833:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.840207 systemd-resolved[200]: Positive Trust Anchors: Mar 17 18:46:46.840224 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:46:46.840250 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:46:46.842347 systemd-resolved[200]: Defaulting to hostname 'linux'. Mar 17 18:46:46.843014 systemd[1]: Started systemd-resolved.service. Mar 17 18:46:46.843203 systemd[1]: Reached target nss-lookup.target. Mar 17 18:46:46.852110 kernel: audit: type=1130 audit(1742237206.836:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.855685 kernel: audit: type=1130 audit(1742237206.842:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.856539 systemd[1]: Finished dracut-cmdline-ask.service. Mar 17 18:46:46.859961 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 17 18:46:46.859980 kernel: audit: type=1130 audit(1742237206.855:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.857212 systemd[1]: Starting dracut-cmdline.service... Mar 17 18:46:46.864315 dracut-cmdline[215]: dracut-dracut-053 Mar 17 18:46:46.865841 kernel: Bridge firewalling registered Mar 17 18:46:46.865910 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:46:46.865772 systemd-modules-load[199]: Inserted module 'br_netfilter' Mar 17 18:46:46.885682 kernel: SCSI subsystem initialized Mar 17 18:46:46.897028 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 17 18:46:46.897058 kernel: device-mapper: uevent: version 1.0.3 Mar 17 18:46:46.897069 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Mar 17 18:46:46.900855 systemd-modules-load[199]: Inserted module 'dm_multipath' Mar 17 18:46:46.901471 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:46:46.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.903274 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:46:46.907882 kernel: audit: type=1130 audit(1742237206.902:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.909278 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:46:46.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.913696 kernel: audit: type=1130 audit(1742237206.909:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.915678 kernel: Loading iSCSI transport class v2.0-870. Mar 17 18:46:46.930698 kernel: iscsi: registered transport (tcp) Mar 17 18:46:46.951682 kernel: iscsi: registered transport (qla4xxx) Mar 17 18:46:46.951696 kernel: QLogic iSCSI HBA Driver Mar 17 18:46:46.978601 systemd[1]: Finished dracut-cmdline.service. Mar 17 18:46:46.983684 kernel: audit: type=1130 audit(1742237206.978:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:46.980036 systemd[1]: Starting dracut-pre-udev.service... Mar 17 18:46:47.024684 kernel: raid6: avx2x4 gen() 29898 MB/s Mar 17 18:46:47.041683 kernel: raid6: avx2x4 xor() 7464 MB/s Mar 17 18:46:47.058679 kernel: raid6: avx2x2 gen() 32138 MB/s Mar 17 18:46:47.075679 kernel: raid6: avx2x2 xor() 19182 MB/s Mar 17 18:46:47.092679 kernel: raid6: avx2x1 gen() 26567 MB/s Mar 17 18:46:47.109678 kernel: raid6: avx2x1 xor() 15154 MB/s Mar 17 18:46:47.126685 kernel: raid6: sse2x4 gen() 14730 MB/s Mar 17 18:46:47.143681 kernel: raid6: sse2x4 xor() 6961 MB/s Mar 17 18:46:47.160679 kernel: raid6: sse2x2 gen() 16209 MB/s Mar 17 18:46:47.177680 kernel: raid6: sse2x2 xor() 9836 MB/s Mar 17 18:46:47.194679 kernel: raid6: sse2x1 gen() 12269 MB/s Mar 17 18:46:47.212062 kernel: raid6: sse2x1 xor() 7758 MB/s Mar 17 18:46:47.212071 kernel: raid6: using algorithm avx2x2 gen() 32138 MB/s Mar 17 18:46:47.212080 kernel: raid6: .... xor() 19182 MB/s, rmw enabled Mar 17 18:46:47.212781 kernel: raid6: using avx2x2 recovery algorithm Mar 17 18:46:47.224681 kernel: xor: automatically using best checksumming function avx Mar 17 18:46:47.312686 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Mar 17 18:46:47.321102 systemd[1]: Finished dracut-pre-udev.service. Mar 17 18:46:47.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:47.324000 audit: BPF prog-id=7 op=LOAD Mar 17 18:46:47.324000 audit: BPF prog-id=8 op=LOAD Mar 17 18:46:47.325676 kernel: audit: type=1130 audit(1742237207.321:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:47.325942 systemd[1]: Starting systemd-udevd.service... Mar 17 18:46:47.338270 systemd-udevd[401]: Using default interface naming scheme 'v252'. Mar 17 18:46:47.341941 systemd[1]: Started systemd-udevd.service. Mar 17 18:46:47.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:47.344362 systemd[1]: Starting dracut-pre-trigger.service... Mar 17 18:46:47.353789 dracut-pre-trigger[408]: rd.md=0: removing MD RAID activation Mar 17 18:46:47.377154 systemd[1]: Finished dracut-pre-trigger.service. Mar 17 18:46:47.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:47.378640 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:46:47.409711 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:46:47.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:47.440698 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Mar 17 18:46:47.446101 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 17 18:46:47.446113 kernel: GPT:9289727 != 19775487 Mar 17 18:46:47.446122 kernel: GPT:Alternate GPT header not at the end of the disk. Mar 17 18:46:47.446131 kernel: GPT:9289727 != 19775487 Mar 17 18:46:47.446139 kernel: GPT: Use GNU Parted to correct GPT errors. Mar 17 18:46:47.446147 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 18:46:47.448683 kernel: cryptd: max_cpu_qlen set to 1000 Mar 17 18:46:47.454681 kernel: libata version 3.00 loaded. Mar 17 18:46:47.460983 kernel: AVX2 version of gcm_enc/dec engaged. Mar 17 18:46:47.461004 kernel: AES CTR mode by8 optimization enabled Mar 17 18:46:47.461682 kernel: ahci 0000:00:1f.2: version 3.0 Mar 17 18:46:47.487206 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Mar 17 18:46:47.487224 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Mar 17 18:46:47.487321 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Mar 17 18:46:47.487396 kernel: scsi host0: ahci Mar 17 18:46:47.487488 kernel: scsi host1: ahci Mar 17 18:46:47.487586 kernel: scsi host2: ahci Mar 17 18:46:47.487679 kernel: scsi host3: ahci Mar 17 18:46:47.487762 kernel: scsi host4: ahci Mar 17 18:46:47.487841 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (447) Mar 17 18:46:47.487851 kernel: scsi host5: ahci Mar 17 18:46:47.487932 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Mar 17 18:46:47.487942 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Mar 17 18:46:47.487951 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Mar 17 18:46:47.487960 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Mar 17 18:46:47.487969 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Mar 17 18:46:47.487977 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Mar 17 18:46:47.478677 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Mar 17 18:46:47.482563 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Mar 17 18:46:47.496119 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Mar 17 18:46:47.500025 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:46:47.503814 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Mar 17 18:46:47.506256 systemd[1]: Starting disk-uuid.service... Mar 17 18:46:47.513723 disk-uuid[525]: Primary Header is updated. Mar 17 18:46:47.513723 disk-uuid[525]: Secondary Entries is updated. Mar 17 18:46:47.513723 disk-uuid[525]: Secondary Header is updated. Mar 17 18:46:47.517059 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 18:46:47.523685 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 18:46:47.798939 kernel: ata5: SATA link down (SStatus 0 SControl 300) Mar 17 18:46:47.798974 kernel: ata1: SATA link down (SStatus 0 SControl 300) Mar 17 18:46:47.798984 kernel: ata6: SATA link down (SStatus 0 SControl 300) Mar 17 18:46:47.799684 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Mar 17 18:46:47.800683 kernel: ata4: SATA link down (SStatus 0 SControl 300) Mar 17 18:46:47.801686 kernel: ata2: SATA link down (SStatus 0 SControl 300) Mar 17 18:46:47.802695 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Mar 17 18:46:47.802715 kernel: ata3.00: applying bridge limits Mar 17 18:46:47.803957 kernel: ata3.00: configured for UDMA/100 Mar 17 18:46:47.804684 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Mar 17 18:46:47.836749 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Mar 17 18:46:47.854209 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 17 18:46:47.854222 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Mar 17 18:46:48.522300 disk-uuid[527]: The operation has completed successfully. Mar 17 18:46:48.523770 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 18:46:48.546191 systemd[1]: disk-uuid.service: Deactivated successfully. Mar 17 18:46:48.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.546277 systemd[1]: Finished disk-uuid.service. Mar 17 18:46:48.549914 systemd[1]: Starting verity-setup.service... Mar 17 18:46:48.562681 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Mar 17 18:46:48.580355 systemd[1]: Found device dev-mapper-usr.device. Mar 17 18:46:48.581593 systemd[1]: Mounting sysusr-usr.mount... Mar 17 18:46:48.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.583357 systemd[1]: Finished verity-setup.service. Mar 17 18:46:48.639600 systemd[1]: Mounted sysusr-usr.mount. Mar 17 18:46:48.641740 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 18:46:48.640423 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Mar 17 18:46:48.640954 systemd[1]: Starting ignition-setup.service... Mar 17 18:46:48.642192 systemd[1]: Starting parse-ip-for-networkd.service... Mar 17 18:46:48.650556 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:46:48.650602 kernel: BTRFS info (device vda6): using free space tree Mar 17 18:46:48.650612 kernel: BTRFS info (device vda6): has skinny extents Mar 17 18:46:48.657704 systemd[1]: mnt-oem.mount: Deactivated successfully. Mar 17 18:46:48.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.665682 systemd[1]: Finished ignition-setup.service. Mar 17 18:46:48.667257 systemd[1]: Starting ignition-fetch-offline.service... Mar 17 18:46:48.701523 ignition[642]: Ignition 2.14.0 Mar 17 18:46:48.701534 ignition[642]: Stage: fetch-offline Mar 17 18:46:48.701603 ignition[642]: no configs at "/usr/lib/ignition/base.d" Mar 17 18:46:48.701612 ignition[642]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Mar 17 18:46:48.701716 ignition[642]: parsed url from cmdline: "" Mar 17 18:46:48.701719 ignition[642]: no config URL provided Mar 17 18:46:48.701723 ignition[642]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:46:48.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.706240 systemd[1]: Finished parse-ip-for-networkd.service. Mar 17 18:46:48.708000 audit: BPF prog-id=9 op=LOAD Mar 17 18:46:48.701729 ignition[642]: no config at "/usr/lib/ignition/user.ign" Mar 17 18:46:48.709131 systemd[1]: Starting systemd-networkd.service... Mar 17 18:46:48.701745 ignition[642]: op(1): [started] loading QEMU firmware config module Mar 17 18:46:48.701750 ignition[642]: op(1): executing: "modprobe" "qemu_fw_cfg" Mar 17 18:46:48.712476 unknown[642]: fetched base config from "system" Mar 17 18:46:48.706720 ignition[642]: op(1): [finished] loading QEMU firmware config module Mar 17 18:46:48.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.712483 unknown[642]: fetched user config from "qemu" Mar 17 18:46:48.708720 ignition[642]: parsing config with SHA512: 6957dd692c72d5e7591532b722f8c4b56283dffd9cb43dc2f86099c4976366f058064ccca33ed5e9289535fb9ab5f1f03e5429e100dd1084e0346aaef02caffd Mar 17 18:46:48.714177 systemd[1]: Finished ignition-fetch-offline.service. Mar 17 18:46:48.712837 ignition[642]: fetch-offline: fetch-offline passed Mar 17 18:46:48.712890 ignition[642]: Ignition finished successfully Mar 17 18:46:48.731365 systemd-networkd[721]: lo: Link UP Mar 17 18:46:48.731374 systemd-networkd[721]: lo: Gained carrier Mar 17 18:46:48.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.731764 systemd-networkd[721]: Enumeration completed Mar 17 18:46:48.731826 systemd[1]: Started systemd-networkd.service. Mar 17 18:46:48.731950 systemd-networkd[721]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:46:48.732731 systemd-networkd[721]: eth0: Link UP Mar 17 18:46:48.732734 systemd-networkd[721]: eth0: Gained carrier Mar 17 18:46:48.733327 systemd[1]: Reached target network.target. Mar 17 18:46:48.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.734846 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Mar 17 18:46:48.744835 iscsid[727]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:46:48.744835 iscsid[727]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Mar 17 18:46:48.744835 iscsid[727]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Mar 17 18:46:48.744835 iscsid[727]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Mar 17 18:46:48.744835 iscsid[727]: If using hardware iscsi like qla4xxx this message can be ignored. Mar 17 18:46:48.744835 iscsid[727]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:46:48.744835 iscsid[727]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Mar 17 18:46:48.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.735404 systemd[1]: Starting ignition-kargs.service... Mar 17 18:46:48.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.748589 ignition[723]: Ignition 2.14.0 Mar 17 18:46:48.736951 systemd[1]: Starting iscsiuio.service... Mar 17 18:46:48.748595 ignition[723]: Stage: kargs Mar 17 18:46:48.740940 systemd[1]: Started iscsiuio.service. Mar 17 18:46:48.748685 ignition[723]: no configs at "/usr/lib/ignition/base.d" Mar 17 18:46:48.742372 systemd[1]: Starting iscsid.service... Mar 17 18:46:48.748692 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Mar 17 18:46:48.745851 systemd[1]: Started iscsid.service. Mar 17 18:46:48.749531 ignition[723]: kargs: kargs passed Mar 17 18:46:48.747711 systemd-networkd[721]: eth0: DHCPv4 address 10.0.0.143/16, gateway 10.0.0.1 acquired from 10.0.0.1 Mar 17 18:46:48.749567 ignition[723]: Ignition finished successfully Mar 17 18:46:48.750160 systemd[1]: Starting dracut-initqueue.service... Mar 17 18:46:48.759214 ignition[734]: Ignition 2.14.0 Mar 17 18:46:48.751593 systemd[1]: Finished ignition-kargs.service. Mar 17 18:46:48.759218 ignition[734]: Stage: disks Mar 17 18:46:48.753144 systemd[1]: Starting ignition-disks.service... Mar 17 18:46:48.759291 ignition[734]: no configs at "/usr/lib/ignition/base.d" Mar 17 18:46:48.761152 systemd[1]: Finished ignition-disks.service. Mar 17 18:46:48.759299 ignition[734]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Mar 17 18:46:48.762265 systemd[1]: Finished dracut-initqueue.service. Mar 17 18:46:48.759957 ignition[734]: disks: disks passed Mar 17 18:46:48.763947 systemd[1]: Reached target initrd-root-device.target. Mar 17 18:46:48.759989 ignition[734]: Ignition finished successfully Mar 17 18:46:48.765424 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:46:48.766956 systemd[1]: Reached target local-fs.target. Mar 17 18:46:48.768281 systemd[1]: Reached target remote-fs-pre.target. Mar 17 18:46:48.769862 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:46:48.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.771625 systemd[1]: Reached target remote-fs.target. Mar 17 18:46:48.773097 systemd[1]: Reached target sysinit.target. Mar 17 18:46:48.774908 systemd[1]: Reached target basic.target. Mar 17 18:46:48.785089 systemd[1]: Starting dracut-pre-mount.service... Mar 17 18:46:48.790574 systemd[1]: Finished dracut-pre-mount.service. Mar 17 18:46:48.792635 systemd[1]: Starting systemd-fsck-root.service... Mar 17 18:46:48.802097 systemd-fsck[754]: ROOT: clean, 623/553520 files, 56022/553472 blocks Mar 17 18:46:48.806873 systemd[1]: Finished systemd-fsck-root.service. Mar 17 18:46:48.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.809657 systemd[1]: Mounting sysroot.mount... Mar 17 18:46:48.815679 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 18:46:48.815964 systemd[1]: Mounted sysroot.mount. Mar 17 18:46:48.816079 systemd[1]: Reached target initrd-root-fs.target. Mar 17 18:46:48.819116 systemd[1]: Mounting sysroot-usr.mount... Mar 17 18:46:48.819451 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Mar 17 18:46:48.819484 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Mar 17 18:46:48.819502 systemd[1]: Reached target ignition-diskful.target. Mar 17 18:46:48.827291 systemd[1]: Mounted sysroot-usr.mount. Mar 17 18:46:48.828710 systemd[1]: Starting initrd-setup-root.service... Mar 17 18:46:48.833950 initrd-setup-root[764]: cut: /sysroot/etc/passwd: No such file or directory Mar 17 18:46:48.837114 initrd-setup-root[772]: cut: /sysroot/etc/group: No such file or directory Mar 17 18:46:48.840142 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory Mar 17 18:46:48.842932 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory Mar 17 18:46:48.864786 systemd[1]: Finished initrd-setup-root.service. Mar 17 18:46:48.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.866455 systemd[1]: Starting ignition-mount.service... Mar 17 18:46:48.867708 systemd[1]: Starting sysroot-boot.service... Mar 17 18:46:48.873932 bash[806]: umount: /sysroot/usr/share/oem: not mounted. Mar 17 18:46:48.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.882586 ignition[807]: INFO : Ignition 2.14.0 Mar 17 18:46:48.882586 ignition[807]: INFO : Stage: mount Mar 17 18:46:48.882586 ignition[807]: INFO : no configs at "/usr/lib/ignition/base.d" Mar 17 18:46:48.882586 ignition[807]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Mar 17 18:46:48.882586 ignition[807]: INFO : mount: mount passed Mar 17 18:46:48.882586 ignition[807]: INFO : Ignition finished successfully Mar 17 18:46:48.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:48.881634 systemd[1]: Finished sysroot-boot.service. Mar 17 18:46:48.883097 systemd[1]: Finished ignition-mount.service. Mar 17 18:46:49.590061 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:46:49.595680 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (815) Mar 17 18:46:49.598364 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:46:49.598385 kernel: BTRFS info (device vda6): using free space tree Mar 17 18:46:49.598395 kernel: BTRFS info (device vda6): has skinny extents Mar 17 18:46:49.601655 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:46:49.604055 systemd[1]: Starting ignition-files.service... Mar 17 18:46:49.617493 ignition[835]: INFO : Ignition 2.14.0 Mar 17 18:46:49.617493 ignition[835]: INFO : Stage: files Mar 17 18:46:49.619500 ignition[835]: INFO : no configs at "/usr/lib/ignition/base.d" Mar 17 18:46:49.619500 ignition[835]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Mar 17 18:46:49.619500 ignition[835]: DEBUG : files: compiled without relabeling support, skipping Mar 17 18:46:49.619500 ignition[835]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Mar 17 18:46:49.619500 ignition[835]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Mar 17 18:46:49.626323 ignition[835]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Mar 17 18:46:49.626323 ignition[835]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Mar 17 18:46:49.626323 ignition[835]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Mar 17 18:46:49.626323 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Mar 17 18:46:49.626323 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Mar 17 18:46:49.626323 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:46:49.626323 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:46:49.626323 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 18:46:49.626323 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 18:46:49.626323 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 18:46:49.626323 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Mar 17 18:46:49.622743 unknown[835]: wrote ssh authorized keys file for user: core Mar 17 18:46:49.995095 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Mar 17 18:46:50.431598 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 18:46:50.431598 ignition[835]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Mar 17 18:46:50.435083 ignition[835]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Mar 17 18:46:50.437048 ignition[835]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Mar 17 18:46:50.437048 ignition[835]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Mar 17 18:46:50.440117 ignition[835]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Mar 17 18:46:50.440117 ignition[835]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Mar 17 18:46:50.459493 ignition[835]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Mar 17 18:46:50.461048 ignition[835]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Mar 17 18:46:50.461048 ignition[835]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:46:50.461048 ignition[835]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:46:50.461048 ignition[835]: INFO : files: files passed Mar 17 18:46:50.461048 ignition[835]: INFO : Ignition finished successfully Mar 17 18:46:50.467948 systemd[1]: Finished ignition-files.service. Mar 17 18:46:50.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.469689 systemd[1]: Starting initrd-setup-root-after-ignition.service... Mar 17 18:46:50.470602 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Mar 17 18:46:50.471117 systemd[1]: Starting ignition-quench.service... Mar 17 18:46:50.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.473677 systemd[1]: ignition-quench.service: Deactivated successfully. Mar 17 18:46:50.473744 systemd[1]: Finished ignition-quench.service. Mar 17 18:46:50.479768 initrd-setup-root-after-ignition[860]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Mar 17 18:46:50.482619 initrd-setup-root-after-ignition[862]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Mar 17 18:46:50.484670 systemd[1]: Finished initrd-setup-root-after-ignition.service. Mar 17 18:46:50.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.486697 systemd[1]: Reached target ignition-complete.target. Mar 17 18:46:50.489101 systemd[1]: Starting initrd-parse-etc.service... Mar 17 18:46:50.500634 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 17 18:46:50.500742 systemd[1]: Finished initrd-parse-etc.service. Mar 17 18:46:50.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.502603 systemd[1]: Reached target initrd-fs.target. Mar 17 18:46:50.504018 systemd[1]: Reached target initrd.target. Mar 17 18:46:50.504251 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Mar 17 18:46:50.504970 systemd[1]: Starting dracut-pre-pivot.service... Mar 17 18:46:50.514073 systemd[1]: Finished dracut-pre-pivot.service. Mar 17 18:46:50.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.515642 systemd[1]: Starting initrd-cleanup.service... Mar 17 18:46:50.524249 systemd[1]: Stopped target nss-lookup.target. Mar 17 18:46:50.525141 systemd[1]: Stopped target remote-cryptsetup.target. Mar 17 18:46:50.526775 systemd[1]: Stopped target timers.target. Mar 17 18:46:50.527806 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 17 18:46:50.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.527884 systemd[1]: Stopped dracut-pre-pivot.service. Mar 17 18:46:50.528194 systemd[1]: Stopped target initrd.target. Mar 17 18:46:50.528471 systemd[1]: Stopped target basic.target. Mar 17 18:46:50.532564 systemd[1]: Stopped target ignition-complete.target. Mar 17 18:46:50.533302 systemd[1]: Stopped target ignition-diskful.target. Mar 17 18:46:50.535586 systemd[1]: Stopped target initrd-root-device.target. Mar 17 18:46:50.536438 systemd[1]: Stopped target remote-fs.target. Mar 17 18:46:50.538760 systemd[1]: Stopped target remote-fs-pre.target. Mar 17 18:46:50.539623 systemd[1]: Stopped target sysinit.target. Mar 17 18:46:50.541081 systemd[1]: Stopped target local-fs.target. Mar 17 18:46:50.542516 systemd[1]: Stopped target local-fs-pre.target. Mar 17 18:46:50.544655 systemd[1]: Stopped target swap.target. Mar 17 18:46:50.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.545371 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 17 18:46:50.545446 systemd[1]: Stopped dracut-pre-mount.service. Mar 17 18:46:50.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.547623 systemd[1]: Stopped target cryptsetup.target. Mar 17 18:46:50.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.549016 systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 17 18:46:50.549091 systemd[1]: Stopped dracut-initqueue.service. Mar 17 18:46:50.550032 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Mar 17 18:46:50.550107 systemd[1]: Stopped ignition-fetch-offline.service. Mar 17 18:46:50.552299 systemd[1]: Stopped target paths.target. Mar 17 18:46:50.553703 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 17 18:46:50.559701 systemd[1]: Stopped systemd-ask-password-console.path. Mar 17 18:46:50.559830 systemd[1]: Stopped target slices.target. Mar 17 18:46:50.562166 systemd[1]: Stopped target sockets.target. Mar 17 18:46:50.562897 systemd[1]: iscsid.socket: Deactivated successfully. Mar 17 18:46:50.562953 systemd[1]: Closed iscsid.socket. Mar 17 18:46:50.564902 systemd[1]: iscsiuio.socket: Deactivated successfully. Mar 17 18:46:50.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.564957 systemd[1]: Closed iscsiuio.socket. Mar 17 18:46:50.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.565780 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Mar 17 18:46:50.565857 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Mar 17 18:46:50.567910 systemd[1]: ignition-files.service: Deactivated successfully. Mar 17 18:46:50.567986 systemd[1]: Stopped ignition-files.service. Mar 17 18:46:50.570122 systemd[1]: Stopping ignition-mount.service... Mar 17 18:46:50.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.576599 ignition[875]: INFO : Ignition 2.14.0 Mar 17 18:46:50.576599 ignition[875]: INFO : Stage: umount Mar 17 18:46:50.576599 ignition[875]: INFO : no configs at "/usr/lib/ignition/base.d" Mar 17 18:46:50.576599 ignition[875]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Mar 17 18:46:50.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.572926 systemd[1]: Stopping sysroot-boot.service... Mar 17 18:46:50.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.582319 ignition[875]: INFO : umount: umount passed Mar 17 18:46:50.582319 ignition[875]: INFO : Ignition finished successfully Mar 17 18:46:50.573986 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 17 18:46:50.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.574156 systemd[1]: Stopped systemd-udev-trigger.service. Mar 17 18:46:50.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.575405 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 17 18:46:50.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.575512 systemd[1]: Stopped dracut-pre-trigger.service. Mar 17 18:46:50.579334 systemd[1]: ignition-mount.service: Deactivated successfully. Mar 17 18:46:50.579433 systemd[1]: Stopped ignition-mount.service. Mar 17 18:46:50.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.581853 systemd[1]: Stopped target network.target. Mar 17 18:46:50.583053 systemd[1]: ignition-disks.service: Deactivated successfully. Mar 17 18:46:50.583089 systemd[1]: Stopped ignition-disks.service. Mar 17 18:46:50.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.585329 systemd[1]: ignition-kargs.service: Deactivated successfully. Mar 17 18:46:50.585359 systemd[1]: Stopped ignition-kargs.service. Mar 17 18:46:50.587080 systemd[1]: ignition-setup.service: Deactivated successfully. Mar 17 18:46:50.587108 systemd[1]: Stopped ignition-setup.service. Mar 17 18:46:50.588718 systemd[1]: Stopping systemd-networkd.service... Mar 17 18:46:50.590441 systemd[1]: Stopping systemd-resolved.service... Mar 17 18:46:50.592079 systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 17 18:46:50.592150 systemd[1]: Finished initrd-cleanup.service. Mar 17 18:46:50.593724 systemd-networkd[721]: eth0: DHCPv6 lease lost Mar 17 18:46:50.600000 audit: BPF prog-id=9 op=UNLOAD Mar 17 18:46:50.595208 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 18:46:50.595294 systemd[1]: Stopped systemd-networkd.service. Mar 17 18:46:50.598703 systemd[1]: systemd-networkd.socket: Deactivated successfully. Mar 17 18:46:50.598731 systemd[1]: Closed systemd-networkd.socket. Mar 17 18:46:50.609085 systemd[1]: Stopping network-cleanup.service... Mar 17 18:46:50.610821 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Mar 17 18:46:50.610865 systemd[1]: Stopped parse-ip-for-networkd.service. Mar 17 18:46:50.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.613710 systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 17 18:46:50.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.613743 systemd[1]: Stopped systemd-sysctl.service. Mar 17 18:46:50.616473 systemd[1]: systemd-modules-load.service: Deactivated successfully. Mar 17 18:46:50.616509 systemd[1]: Stopped systemd-modules-load.service. Mar 17 18:46:50.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.619128 systemd[1]: Stopping systemd-udevd.service... Mar 17 18:46:50.621499 systemd[1]: sysroot-boot.mount: Deactivated successfully. Mar 17 18:46:50.621563 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 17 18:46:50.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.622051 systemd[1]: systemd-resolved.service: Deactivated successfully. Mar 17 18:46:50.622124 systemd[1]: Stopped systemd-resolved.service. Mar 17 18:46:50.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.625547 systemd[1]: network-cleanup.service: Deactivated successfully. Mar 17 18:46:50.625636 systemd[1]: Stopped network-cleanup.service. Mar 17 18:46:50.629000 audit: BPF prog-id=6 op=UNLOAD Mar 17 18:46:50.629943 systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 17 18:46:50.630050 systemd[1]: Stopped systemd-udevd.service. Mar 17 18:46:50.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.632833 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 17 18:46:50.632877 systemd[1]: Closed systemd-udevd-control.socket. Mar 17 18:46:50.634762 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 17 18:46:50.634786 systemd[1]: Closed systemd-udevd-kernel.socket. Mar 17 18:46:50.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.636362 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 17 18:46:50.636399 systemd[1]: Stopped dracut-pre-udev.service. Mar 17 18:46:50.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.638254 systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 17 18:46:50.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.638283 systemd[1]: Stopped dracut-cmdline.service. Mar 17 18:46:50.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.639829 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Mar 17 18:46:50.639860 systemd[1]: Stopped dracut-cmdline-ask.service. Mar 17 18:46:50.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.642327 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Mar 17 18:46:50.643190 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Mar 17 18:46:50.643226 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Mar 17 18:46:50.644181 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 17 18:46:50.644212 systemd[1]: Stopped kmod-static-nodes.service. Mar 17 18:46:50.645932 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 17 18:46:50.645965 systemd[1]: Stopped systemd-vconsole-setup.service. Mar 17 18:46:50.647734 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Mar 17 18:46:50.648093 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 17 18:46:50.648159 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Mar 17 18:46:50.662145 systemd[1]: sysroot-boot.service: Deactivated successfully. Mar 17 18:46:50.662254 systemd[1]: Stopped sysroot-boot.service. Mar 17 18:46:50.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.664004 systemd[1]: Reached target initrd-switch-root.target. Mar 17 18:46:50.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.665469 systemd[1]: initrd-setup-root.service: Deactivated successfully. Mar 17 18:46:50.665502 systemd[1]: Stopped initrd-setup-root.service. Mar 17 18:46:50.666182 systemd[1]: Starting initrd-switch-root.service... Mar 17 18:46:50.681595 systemd[1]: Switching root. Mar 17 18:46:50.700373 iscsid[727]: iscsid shutting down. Mar 17 18:46:50.701115 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). Mar 17 18:46:50.701151 systemd-journald[198]: Journal stopped Mar 17 18:46:53.114334 kernel: SELinux: Class mctp_socket not defined in policy. Mar 17 18:46:53.114389 kernel: SELinux: Class anon_inode not defined in policy. Mar 17 18:46:53.114400 kernel: SELinux: the above unknown classes and permissions will be allowed Mar 17 18:46:53.114410 kernel: SELinux: policy capability network_peer_controls=1 Mar 17 18:46:53.114424 kernel: SELinux: policy capability open_perms=1 Mar 17 18:46:53.114434 kernel: SELinux: policy capability extended_socket_class=1 Mar 17 18:46:53.114443 kernel: SELinux: policy capability always_check_network=0 Mar 17 18:46:53.114453 kernel: SELinux: policy capability cgroup_seclabel=1 Mar 17 18:46:53.114462 kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 17 18:46:53.114473 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Mar 17 18:46:53.114483 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Mar 17 18:46:53.114493 systemd[1]: Successfully loaded SELinux policy in 38.035ms. Mar 17 18:46:53.114514 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.572ms. Mar 17 18:46:53.114525 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:46:53.114535 systemd[1]: Detected virtualization kvm. Mar 17 18:46:53.114546 systemd[1]: Detected architecture x86-64. Mar 17 18:46:53.114563 systemd[1]: Detected first boot. Mar 17 18:46:53.114573 systemd[1]: Initializing machine ID from VM UUID. Mar 17 18:46:53.114583 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Mar 17 18:46:53.114597 systemd[1]: Populated /etc with preset unit settings. Mar 17 18:46:53.114607 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:46:53.114623 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:46:53.114634 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:46:53.114644 kernel: kauditd_printk_skb: 79 callbacks suppressed Mar 17 18:46:53.114654 kernel: audit: type=1334 audit(1742237212.977:83): prog-id=12 op=LOAD Mar 17 18:46:53.114689 kernel: audit: type=1334 audit(1742237212.977:84): prog-id=3 op=UNLOAD Mar 17 18:46:53.114699 kernel: audit: type=1334 audit(1742237212.978:85): prog-id=13 op=LOAD Mar 17 18:46:53.114708 kernel: audit: type=1334 audit(1742237212.979:86): prog-id=14 op=LOAD Mar 17 18:46:53.114717 kernel: audit: type=1334 audit(1742237212.979:87): prog-id=4 op=UNLOAD Mar 17 18:46:53.114726 kernel: audit: type=1334 audit(1742237212.979:88): prog-id=5 op=UNLOAD Mar 17 18:46:53.114736 kernel: audit: type=1334 audit(1742237212.982:89): prog-id=15 op=LOAD Mar 17 18:46:53.114745 kernel: audit: type=1334 audit(1742237212.982:90): prog-id=12 op=UNLOAD Mar 17 18:46:53.114755 kernel: audit: type=1334 audit(1742237212.984:91): prog-id=16 op=LOAD Mar 17 18:46:53.114766 kernel: audit: type=1334 audit(1742237212.986:92): prog-id=17 op=LOAD Mar 17 18:46:53.114776 systemd[1]: iscsiuio.service: Deactivated successfully. Mar 17 18:46:53.114786 systemd[1]: Stopped iscsiuio.service. Mar 17 18:46:53.114799 systemd[1]: iscsid.service: Deactivated successfully. Mar 17 18:46:53.114812 systemd[1]: Stopped iscsid.service. Mar 17 18:46:53.114823 systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 17 18:46:53.114833 systemd[1]: Stopped initrd-switch-root.service. Mar 17 18:46:53.114843 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 17 18:46:53.114855 systemd[1]: Created slice system-addon\x2dconfig.slice. Mar 17 18:46:53.114865 systemd[1]: Created slice system-addon\x2drun.slice. Mar 17 18:46:53.114876 systemd[1]: Created slice system-getty.slice. Mar 17 18:46:53.114886 systemd[1]: Created slice system-modprobe.slice. Mar 17 18:46:53.114897 systemd[1]: Created slice system-serial\x2dgetty.slice. Mar 17 18:46:53.114907 systemd[1]: Created slice system-system\x2dcloudinit.slice. Mar 17 18:46:53.114917 systemd[1]: Created slice system-systemd\x2dfsck.slice. Mar 17 18:46:53.114928 systemd[1]: Created slice user.slice. Mar 17 18:46:53.114939 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:46:53.114949 systemd[1]: Started systemd-ask-password-wall.path. Mar 17 18:46:53.114959 systemd[1]: Set up automount boot.automount. Mar 17 18:46:53.114969 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Mar 17 18:46:53.114979 systemd[1]: Stopped target initrd-switch-root.target. Mar 17 18:46:53.114991 systemd[1]: Stopped target initrd-fs.target. Mar 17 18:46:53.115001 systemd[1]: Stopped target initrd-root-fs.target. Mar 17 18:46:53.115011 systemd[1]: Reached target integritysetup.target. Mar 17 18:46:53.115021 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:46:53.115031 systemd[1]: Reached target remote-fs.target. Mar 17 18:46:53.115042 systemd[1]: Reached target slices.target. Mar 17 18:46:53.115052 systemd[1]: Reached target swap.target. Mar 17 18:46:53.115062 systemd[1]: Reached target torcx.target. Mar 17 18:46:53.115072 systemd[1]: Reached target veritysetup.target. Mar 17 18:46:53.115082 systemd[1]: Listening on systemd-coredump.socket. Mar 17 18:46:53.115094 systemd[1]: Listening on systemd-initctl.socket. Mar 17 18:46:53.115104 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:46:53.115114 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:46:53.115123 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:46:53.115133 systemd[1]: Listening on systemd-userdbd.socket. Mar 17 18:46:53.115143 systemd[1]: Mounting dev-hugepages.mount... Mar 17 18:46:53.115153 systemd[1]: Mounting dev-mqueue.mount... Mar 17 18:46:53.115163 systemd[1]: Mounting media.mount... Mar 17 18:46:53.115173 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:46:53.115185 systemd[1]: Mounting sys-kernel-debug.mount... Mar 17 18:46:53.115195 systemd[1]: Mounting sys-kernel-tracing.mount... Mar 17 18:46:53.115205 systemd[1]: Mounting tmp.mount... Mar 17 18:46:53.115215 systemd[1]: Starting flatcar-tmpfiles.service... Mar 17 18:46:53.115225 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:46:53.115235 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:46:53.115245 systemd[1]: Starting modprobe@configfs.service... Mar 17 18:46:53.115255 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:46:53.115265 systemd[1]: Starting modprobe@drm.service... Mar 17 18:46:53.115276 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:46:53.115286 systemd[1]: Starting modprobe@fuse.service... Mar 17 18:46:53.115296 systemd[1]: Starting modprobe@loop.service... Mar 17 18:46:53.115307 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Mar 17 18:46:53.115317 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 17 18:46:53.115327 systemd[1]: Stopped systemd-fsck-root.service. Mar 17 18:46:53.115337 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Mar 17 18:46:53.115347 systemd[1]: Stopped systemd-fsck-usr.service. Mar 17 18:46:53.115357 kernel: fuse: init (API version 7.34) Mar 17 18:46:53.115367 kernel: loop: module loaded Mar 17 18:46:53.115384 systemd[1]: Stopped systemd-journald.service. Mar 17 18:46:53.115395 systemd[1]: Starting systemd-journald.service... Mar 17 18:46:53.115405 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:46:53.115415 systemd[1]: Starting systemd-network-generator.service... Mar 17 18:46:53.115425 systemd[1]: Starting systemd-remount-fs.service... Mar 17 18:46:53.115436 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:46:53.115446 systemd[1]: verity-setup.service: Deactivated successfully. Mar 17 18:46:53.115455 systemd[1]: Stopped verity-setup.service. Mar 17 18:46:53.115467 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:46:53.115479 systemd-journald[989]: Journal started Mar 17 18:46:53.115514 systemd-journald[989]: Runtime Journal (/run/log/journal/5e051628b02348449e8a138f8de19fe7) is 6.0M, max 48.4M, 42.4M free. Mar 17 18:46:50.758000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 18:46:50.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:46:50.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:46:50.930000 audit: BPF prog-id=10 op=LOAD Mar 17 18:46:50.930000 audit: BPF prog-id=10 op=UNLOAD Mar 17 18:46:50.930000 audit: BPF prog-id=11 op=LOAD Mar 17 18:46:50.930000 audit: BPF prog-id=11 op=UNLOAD Mar 17 18:46:50.960000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 18:46:50.960000 audit[908]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858dc a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:46:50.960000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:46:50.963000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Mar 17 18:46:50.963000 audit[908]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b5 a2=1ed a3=0 items=2 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:46:50.963000 audit: CWD cwd="/" Mar 17 18:46:50.963000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:50.963000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:50.963000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:46:52.977000 audit: BPF prog-id=12 op=LOAD Mar 17 18:46:52.977000 audit: BPF prog-id=3 op=UNLOAD Mar 17 18:46:52.978000 audit: BPF prog-id=13 op=LOAD Mar 17 18:46:52.979000 audit: BPF prog-id=14 op=LOAD Mar 17 18:46:52.979000 audit: BPF prog-id=4 op=UNLOAD Mar 17 18:46:52.979000 audit: BPF prog-id=5 op=UNLOAD Mar 17 18:46:52.982000 audit: BPF prog-id=15 op=LOAD Mar 17 18:46:52.982000 audit: BPF prog-id=12 op=UNLOAD Mar 17 18:46:52.984000 audit: BPF prog-id=16 op=LOAD Mar 17 18:46:52.986000 audit: BPF prog-id=17 op=LOAD Mar 17 18:46:52.986000 audit: BPF prog-id=13 op=UNLOAD Mar 17 18:46:52.986000 audit: BPF prog-id=14 op=UNLOAD Mar 17 18:46:52.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:52.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:52.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:52.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:52.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.001000 audit: BPF prog-id=15 op=UNLOAD Mar 17 18:46:53.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.095000 audit: BPF prog-id=18 op=LOAD Mar 17 18:46:53.095000 audit: BPF prog-id=19 op=LOAD Mar 17 18:46:53.095000 audit: BPF prog-id=20 op=LOAD Mar 17 18:46:53.095000 audit: BPF prog-id=16 op=UNLOAD Mar 17 18:46:53.095000 audit: BPF prog-id=17 op=UNLOAD Mar 17 18:46:53.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.112000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Mar 17 18:46:53.112000 audit[989]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcd3f66f80 a2=4000 a3=7ffcd3f6701c items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:46:53.112000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Mar 17 18:46:52.976564 systemd[1]: Queued start job for default target multi-user.target. Mar 17 18:46:50.960436 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:46:52.976575 systemd[1]: Unnecessary job was removed for dev-vda6.device. Mar 17 18:46:50.960640 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:46:52.988192 systemd[1]: systemd-journald.service: Deactivated successfully. Mar 17 18:46:50.960655 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:46:50.960696 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Mar 17 18:46:50.960706 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=debug msg="skipped missing lower profile" missing profile=oem Mar 17 18:46:50.960732 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Mar 17 18:46:50.960743 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Mar 17 18:46:50.960923 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Mar 17 18:46:50.960959 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:46:50.960971 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:46:50.961236 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Mar 17 18:46:53.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:50.961270 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Mar 17 18:46:53.117672 systemd[1]: Started systemd-journald.service. Mar 17 18:46:50.961286 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Mar 17 18:46:50.961301 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Mar 17 18:46:50.961316 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Mar 17 18:46:53.117889 systemd[1]: Mounted dev-hugepages.mount. Mar 17 18:46:50.961329 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Mar 17 18:46:52.733278 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:52Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:46:52.733536 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:52Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:46:52.733624 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:52Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:46:52.733786 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:52Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:46:52.733834 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:52Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Mar 17 18:46:52.733885 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2025-03-17T18:46:52Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Mar 17 18:46:53.118785 systemd[1]: Mounted dev-mqueue.mount. Mar 17 18:46:53.119542 systemd[1]: Mounted media.mount. Mar 17 18:46:53.120243 systemd[1]: Mounted sys-kernel-debug.mount. Mar 17 18:46:53.121068 systemd[1]: Mounted sys-kernel-tracing.mount. Mar 17 18:46:53.121916 systemd[1]: Mounted tmp.mount. Mar 17 18:46:53.122822 systemd[1]: Finished flatcar-tmpfiles.service. Mar 17 18:46:53.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.123915 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:46:53.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.124990 systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 17 18:46:53.125195 systemd[1]: Finished modprobe@configfs.service. Mar 17 18:46:53.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.126201 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:46:53.126324 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:46:53.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.127291 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:46:53.127534 systemd[1]: Finished modprobe@drm.service. Mar 17 18:46:53.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.128514 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:46:53.128717 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:46:53.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.129826 systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 17 18:46:53.129991 systemd[1]: Finished modprobe@fuse.service. Mar 17 18:46:53.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.130929 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:46:53.131064 systemd[1]: Finished modprobe@loop.service. Mar 17 18:46:53.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.132118 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:46:53.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.133237 systemd[1]: Finished systemd-network-generator.service. Mar 17 18:46:53.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.134353 systemd[1]: Finished systemd-remount-fs.service. Mar 17 18:46:53.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.135554 systemd[1]: Reached target network-pre.target. Mar 17 18:46:53.137292 systemd[1]: Mounting sys-fs-fuse-connections.mount... Mar 17 18:46:53.138941 systemd[1]: Mounting sys-kernel-config.mount... Mar 17 18:46:53.139679 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Mar 17 18:46:53.141076 systemd[1]: Starting systemd-hwdb-update.service... Mar 17 18:46:53.144645 systemd[1]: Starting systemd-journal-flush.service... Mar 17 18:46:53.145850 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:46:53.148558 systemd-journald[989]: Time spent on flushing to /var/log/journal/5e051628b02348449e8a138f8de19fe7 is 13.566ms for 1143 entries. Mar 17 18:46:53.148558 systemd-journald[989]: System Journal (/var/log/journal/5e051628b02348449e8a138f8de19fe7) is 8.0M, max 195.6M, 187.6M free. Mar 17 18:46:53.174840 systemd-journald[989]: Received client request to flush runtime journal. Mar 17 18:46:53.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.146627 systemd[1]: Starting systemd-random-seed.service... Mar 17 18:46:53.147444 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:46:53.148293 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:46:53.151369 systemd[1]: Starting systemd-sysusers.service... Mar 17 18:46:53.175918 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Mar 17 18:46:53.154572 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:46:53.155749 systemd[1]: Mounted sys-fs-fuse-connections.mount. Mar 17 18:46:53.156831 systemd[1]: Mounted sys-kernel-config.mount. Mar 17 18:46:53.157875 systemd[1]: Finished systemd-random-seed.service. Mar 17 18:46:53.159117 systemd[1]: Reached target first-boot-complete.target. Mar 17 18:46:53.161300 systemd[1]: Starting systemd-udev-settle.service... Mar 17 18:46:53.168115 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:46:53.173913 systemd[1]: Finished systemd-sysusers.service. Mar 17 18:46:53.175608 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 18:46:53.176798 systemd[1]: Finished systemd-journal-flush.service. Mar 17 18:46:53.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.191225 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 18:46:53.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.592648 systemd[1]: Finished systemd-hwdb-update.service. Mar 17 18:46:53.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.593000 audit: BPF prog-id=21 op=LOAD Mar 17 18:46:53.593000 audit: BPF prog-id=22 op=LOAD Mar 17 18:46:53.593000 audit: BPF prog-id=7 op=UNLOAD Mar 17 18:46:53.593000 audit: BPF prog-id=8 op=UNLOAD Mar 17 18:46:53.594990 systemd[1]: Starting systemd-udevd.service... Mar 17 18:46:53.609728 systemd-udevd[1016]: Using default interface naming scheme 'v252'. Mar 17 18:46:53.621262 systemd[1]: Started systemd-udevd.service. Mar 17 18:46:53.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.622000 audit: BPF prog-id=23 op=LOAD Mar 17 18:46:53.624591 systemd[1]: Starting systemd-networkd.service... Mar 17 18:46:53.628000 audit: BPF prog-id=24 op=LOAD Mar 17 18:46:53.628000 audit: BPF prog-id=25 op=LOAD Mar 17 18:46:53.628000 audit: BPF prog-id=26 op=LOAD Mar 17 18:46:53.629388 systemd[1]: Starting systemd-userdbd.service... Mar 17 18:46:53.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.654030 systemd[1]: Started systemd-userdbd.service. Mar 17 18:46:53.655222 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Mar 17 18:46:53.661010 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:46:53.680688 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Mar 17 18:46:53.686675 kernel: ACPI: button: Power Button [PWRF] Mar 17 18:46:53.697006 systemd-networkd[1026]: lo: Link UP Mar 17 18:46:53.697209 systemd-networkd[1026]: lo: Gained carrier Mar 17 18:46:53.697619 systemd-networkd[1026]: Enumeration completed Mar 17 18:46:53.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.697765 systemd[1]: Started systemd-networkd.service. Mar 17 18:46:53.697781 systemd-networkd[1026]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:46:53.699542 systemd-networkd[1026]: eth0: Link UP Mar 17 18:46:53.699549 systemd-networkd[1026]: eth0: Gained carrier Mar 17 18:46:53.696000 audit[1025]: AVC avc: denied { confidentiality } for pid=1025 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 18:46:53.696000 audit[1025]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55de7d9b8c00 a1=338ac a2=7f266c1acbc5 a3=5 items=110 ppid=1016 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:46:53.696000 audit: CWD cwd="/" Mar 17 18:46:53.696000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=1 name=(null) inode=15588 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=2 name=(null) inode=15588 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=3 name=(null) inode=15589 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=4 name=(null) inode=15588 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=5 name=(null) inode=15590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=6 name=(null) inode=15588 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=7 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=8 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=9 name=(null) inode=15592 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=10 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=11 name=(null) inode=15593 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=12 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=13 name=(null) inode=15594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=14 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=15 name=(null) inode=15595 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=16 name=(null) inode=15591 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=17 name=(null) inode=15596 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=18 name=(null) inode=15588 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=19 name=(null) inode=15597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=20 name=(null) inode=15597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=21 name=(null) inode=15598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=22 name=(null) inode=15597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=23 name=(null) inode=15599 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=24 name=(null) inode=15597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=25 name=(null) inode=15600 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=26 name=(null) inode=15597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=27 name=(null) inode=15601 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=28 name=(null) inode=15597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=29 name=(null) inode=15602 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=30 name=(null) inode=15588 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=31 name=(null) inode=15603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=32 name=(null) inode=15603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=33 name=(null) inode=15604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=34 name=(null) inode=15603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=35 name=(null) inode=15605 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=36 name=(null) inode=15603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=37 name=(null) inode=15606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=38 name=(null) inode=15603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=39 name=(null) inode=15607 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=40 name=(null) inode=15603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=41 name=(null) inode=15608 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=42 name=(null) inode=15588 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=43 name=(null) inode=15609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=44 name=(null) inode=15609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=45 name=(null) inode=15610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=46 name=(null) inode=15609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=47 name=(null) inode=15611 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=48 name=(null) inode=15609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=49 name=(null) inode=15612 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=50 name=(null) inode=15609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=51 name=(null) inode=15613 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=52 name=(null) inode=15609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=53 name=(null) inode=15614 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=55 name=(null) inode=15615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=56 name=(null) inode=15615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=57 name=(null) inode=15616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=58 name=(null) inode=15615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=59 name=(null) inode=15617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=60 name=(null) inode=15615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=61 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=62 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=63 name=(null) inode=15619 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=64 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=65 name=(null) inode=15620 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=66 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=67 name=(null) inode=15621 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=68 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=69 name=(null) inode=15622 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=70 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=71 name=(null) inode=15623 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=72 name=(null) inode=15615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=73 name=(null) inode=15624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=74 name=(null) inode=15624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.709375 systemd-networkd[1026]: eth0: DHCPv4 address 10.0.0.143/16, gateway 10.0.0.1 acquired from 10.0.0.1 Mar 17 18:46:53.696000 audit: PATH item=75 name=(null) inode=15625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=76 name=(null) inode=15624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=77 name=(null) inode=15626 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=78 name=(null) inode=15624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=79 name=(null) inode=15627 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=80 name=(null) inode=15624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=81 name=(null) inode=15628 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=82 name=(null) inode=15624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=83 name=(null) inode=15629 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=84 name=(null) inode=15615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=85 name=(null) inode=15630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=86 name=(null) inode=15630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=87 name=(null) inode=15631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=88 name=(null) inode=15630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=89 name=(null) inode=15632 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=90 name=(null) inode=15630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=91 name=(null) inode=15633 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=92 name=(null) inode=15630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=93 name=(null) inode=15634 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=94 name=(null) inode=15630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=95 name=(null) inode=15635 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=96 name=(null) inode=15615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=97 name=(null) inode=15636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=98 name=(null) inode=15636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=99 name=(null) inode=15637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=100 name=(null) inode=15636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=101 name=(null) inode=15638 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=102 name=(null) inode=15636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=103 name=(null) inode=15639 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=104 name=(null) inode=15636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=105 name=(null) inode=15640 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=106 name=(null) inode=15636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=107 name=(null) inode=15641 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PATH item=109 name=(null) inode=15642 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:46:53.696000 audit: PROCTITLE proctitle="(udev-worker)" Mar 17 18:46:53.726682 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Mar 17 18:46:53.730734 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Mar 17 18:46:53.735070 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Mar 17 18:46:53.735177 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Mar 17 18:46:53.735276 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Mar 17 18:46:53.741679 kernel: mousedev: PS/2 mouse device common for all mice Mar 17 18:46:53.786262 kernel: kvm: Nested Virtualization enabled Mar 17 18:46:53.786344 kernel: SVM: kvm: Nested Paging enabled Mar 17 18:46:53.786369 kernel: SVM: Virtual VMLOAD VMSAVE supported Mar 17 18:46:53.786935 kernel: SVM: Virtual GIF supported Mar 17 18:46:53.802688 kernel: EDAC MC: Ver: 3.0.0 Mar 17 18:46:53.826977 systemd[1]: Finished systemd-udev-settle.service. Mar 17 18:46:53.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.829070 systemd[1]: Starting lvm2-activation-early.service... Mar 17 18:46:53.835613 lvm[1052]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:46:53.861145 systemd[1]: Finished lvm2-activation-early.service. Mar 17 18:46:53.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.862199 systemd[1]: Reached target cryptsetup.target. Mar 17 18:46:53.863835 systemd[1]: Starting lvm2-activation.service... Mar 17 18:46:53.866330 lvm[1053]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:46:53.890629 systemd[1]: Finished lvm2-activation.service. Mar 17 18:46:53.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.891588 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:46:53.892509 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 17 18:46:53.892531 systemd[1]: Reached target local-fs.target. Mar 17 18:46:53.893372 systemd[1]: Reached target machines.target. Mar 17 18:46:53.895033 systemd[1]: Starting ldconfig.service... Mar 17 18:46:53.896048 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:46:53.896088 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:46:53.896863 systemd[1]: Starting systemd-boot-update.service... Mar 17 18:46:53.898818 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Mar 17 18:46:53.900926 systemd[1]: Starting systemd-machine-id-commit.service... Mar 17 18:46:53.903250 systemd[1]: Starting systemd-sysext.service... Mar 17 18:46:53.904508 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1055 (bootctl) Mar 17 18:46:53.905634 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Mar 17 18:46:53.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.910238 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Mar 17 18:46:53.913960 systemd[1]: Unmounting usr-share-oem.mount... Mar 17 18:46:53.917963 systemd[1]: usr-share-oem.mount: Deactivated successfully. Mar 17 18:46:53.918124 systemd[1]: Unmounted usr-share-oem.mount. Mar 17 18:46:53.927681 kernel: loop0: detected capacity change from 0 to 205544 Mar 17 18:46:53.959314 systemd-fsck[1063]: fsck.fat 4.2 (2021-01-31) Mar 17 18:46:53.959314 systemd-fsck[1063]: /dev/vda1: 790 files, 119319/258078 clusters Mar 17 18:46:53.960643 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Mar 17 18:46:53.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:53.963098 systemd[1]: Mounting boot.mount... Mar 17 18:46:54.095749 systemd[1]: Mounted boot.mount. Mar 17 18:46:54.103691 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 17 18:46:54.105843 systemd[1]: Finished systemd-machine-id-commit.service. Mar 17 18:46:54.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.109232 systemd[1]: Finished systemd-boot-update.service. Mar 17 18:46:54.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.115517 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Mar 17 18:46:54.118675 kernel: loop1: detected capacity change from 0 to 205544 Mar 17 18:46:54.121918 (sd-sysext)[1068]: Using extensions 'kubernetes'. Mar 17 18:46:54.122212 (sd-sysext)[1068]: Merged extensions into '/usr'. Mar 17 18:46:54.136572 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:46:54.137731 systemd[1]: Mounting usr-share-oem.mount... Mar 17 18:46:54.138604 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.139709 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:46:54.141762 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:46:54.143448 systemd[1]: Starting modprobe@loop.service... Mar 17 18:46:54.144218 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.144330 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:46:54.144440 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:46:54.146775 systemd[1]: Mounted usr-share-oem.mount. Mar 17 18:46:54.147818 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:46:54.147928 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:46:54.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.149066 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:46:54.149161 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:46:54.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.150723 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:46:54.150877 systemd[1]: Finished modprobe@loop.service. Mar 17 18:46:54.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.152296 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:46:54.152396 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.153307 systemd[1]: Finished systemd-sysext.service. Mar 17 18:46:54.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.155377 systemd[1]: Starting ensure-sysext.service... Mar 17 18:46:54.157189 systemd[1]: Starting systemd-tmpfiles-setup.service... Mar 17 18:46:54.162807 systemd[1]: Reloading. Mar 17 18:46:54.166390 ldconfig[1054]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Mar 17 18:46:54.166969 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Mar 17 18:46:54.167554 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Mar 17 18:46:54.168834 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Mar 17 18:46:54.215485 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2025-03-17T18:46:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:46:54.215812 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2025-03-17T18:46:54Z" level=info msg="torcx already run" Mar 17 18:46:54.276476 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:46:54.276493 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:46:54.293086 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:46:54.340000 audit: BPF prog-id=27 op=LOAD Mar 17 18:46:54.340000 audit: BPF prog-id=28 op=LOAD Mar 17 18:46:54.340000 audit: BPF prog-id=21 op=UNLOAD Mar 17 18:46:54.340000 audit: BPF prog-id=22 op=UNLOAD Mar 17 18:46:54.341000 audit: BPF prog-id=29 op=LOAD Mar 17 18:46:54.341000 audit: BPF prog-id=24 op=UNLOAD Mar 17 18:46:54.341000 audit: BPF prog-id=30 op=LOAD Mar 17 18:46:54.341000 audit: BPF prog-id=31 op=LOAD Mar 17 18:46:54.341000 audit: BPF prog-id=25 op=UNLOAD Mar 17 18:46:54.341000 audit: BPF prog-id=26 op=UNLOAD Mar 17 18:46:54.342000 audit: BPF prog-id=32 op=LOAD Mar 17 18:46:54.342000 audit: BPF prog-id=18 op=UNLOAD Mar 17 18:46:54.342000 audit: BPF prog-id=33 op=LOAD Mar 17 18:46:54.342000 audit: BPF prog-id=34 op=LOAD Mar 17 18:46:54.342000 audit: BPF prog-id=19 op=UNLOAD Mar 17 18:46:54.342000 audit: BPF prog-id=20 op=UNLOAD Mar 17 18:46:54.343000 audit: BPF prog-id=35 op=LOAD Mar 17 18:46:54.343000 audit: BPF prog-id=23 op=UNLOAD Mar 17 18:46:54.347089 systemd[1]: Finished ldconfig.service. Mar 17 18:46:54.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.348224 systemd[1]: Finished systemd-tmpfiles-setup.service. Mar 17 18:46:54.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.352213 systemd[1]: Starting audit-rules.service... Mar 17 18:46:54.353796 systemd[1]: Starting clean-ca-certificates.service... Mar 17 18:46:54.355543 systemd[1]: Starting systemd-journal-catalog-update.service... Mar 17 18:46:54.356000 audit: BPF prog-id=36 op=LOAD Mar 17 18:46:54.357744 systemd[1]: Starting systemd-resolved.service... Mar 17 18:46:54.358000 audit: BPF prog-id=37 op=LOAD Mar 17 18:46:54.359705 systemd[1]: Starting systemd-timesyncd.service... Mar 17 18:46:54.361630 systemd[1]: Starting systemd-update-utmp.service... Mar 17 18:46:54.362843 systemd[1]: Finished clean-ca-certificates.service. Mar 17 18:46:54.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.364000 audit[1146]: SYSTEM_BOOT pid=1146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.367279 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:46:54.369114 systemd[1]: Finished systemd-update-utmp.service. Mar 17 18:46:54.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.370786 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:46:54.371010 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.372056 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:46:54.373994 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:46:54.375880 systemd[1]: Starting modprobe@loop.service... Mar 17 18:46:54.376632 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.376763 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:46:54.376865 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:46:54.376948 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:46:54.377846 systemd[1]: Finished systemd-journal-catalog-update.service. Mar 17 18:46:54.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.379153 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:46:54.379261 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:46:54.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.380473 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:46:54.380571 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:46:54.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.381813 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:46:54.381918 systemd[1]: Finished modprobe@loop.service. Mar 17 18:46:54.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.383074 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:46:54.383159 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.384204 systemd[1]: Starting systemd-update-done.service... Mar 17 18:46:54.386552 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:46:54.386730 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.387587 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:46:54.389415 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:46:54.391292 systemd[1]: Starting modprobe@loop.service... Mar 17 18:46:54.392197 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.392308 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:46:54.392412 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:46:54.392483 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:46:54.393964 systemd[1]: Finished systemd-update-done.service. Mar 17 18:46:54.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.395421 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:46:54.395520 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:46:54.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.396992 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:46:54.397088 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:46:54.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.398417 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:46:54.398516 systemd[1]: Finished modprobe@loop.service. Mar 17 18:46:54.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:46:54.399814 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:46:54.399895 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.400557 augenrules[1164]: No rules Mar 17 18:46:54.399000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 18:46:54.399000 audit[1164]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3004d1c0 a2=420 a3=0 items=0 ppid=1137 pid=1164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:46:54.399000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 18:46:54.402409 systemd[1]: Finished audit-rules.service. Mar 17 18:46:54.403466 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:46:54.403655 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.404765 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:46:54.406395 systemd[1]: Starting modprobe@drm.service... Mar 17 18:46:54.408326 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:46:54.410085 systemd[1]: Starting modprobe@loop.service... Mar 17 18:46:54.410880 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.411011 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:46:54.411998 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 18:46:54.412989 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:46:54.413077 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:46:54.413989 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:46:54.414090 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:46:54.415229 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:46:54.415317 systemd[1]: Finished modprobe@drm.service. Mar 17 18:46:54.416367 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:46:54.416463 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:46:54.417769 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:46:54.417860 systemd[1]: Finished modprobe@loop.service. Mar 17 18:46:54.418725 systemd-resolved[1140]: Positive Trust Anchors: Mar 17 18:46:54.418735 systemd-resolved[1140]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:46:54.418760 systemd-resolved[1140]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:46:54.419128 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:46:54.419210 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.421042 systemd[1]: Finished ensure-sysext.service. Mar 17 18:46:54.424975 systemd-resolved[1140]: Defaulting to hostname 'linux'. Mar 17 18:46:54.426200 systemd[1]: Started systemd-resolved.service. Mar 17 18:46:54.427059 systemd[1]: Reached target network.target. Mar 17 18:46:54.427915 systemd[1]: Reached target nss-lookup.target. Mar 17 18:46:54.441634 systemd[1]: Started systemd-timesyncd.service. Mar 17 18:46:54.442554 systemd[1]: Reached target sysinit.target. Mar 17 18:46:54.443413 systemd[1]: Started motdgen.path. Mar 17 18:46:54.444131 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Mar 17 18:46:54.445268 systemd[1]: Started systemd-tmpfiles-clean.timer. Mar 17 18:46:54.446110 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Mar 17 18:46:54.446132 systemd[1]: Reached target paths.target. Mar 17 18:46:54.446134 systemd-timesyncd[1142]: Contacted time server 10.0.0.1:123 (10.0.0.1). Mar 17 18:46:54.446869 systemd[1]: Reached target time-set.target. Mar 17 18:46:54.446879 systemd-timesyncd[1142]: Initial clock synchronization to Mon 2025-03-17 18:46:54.611191 UTC. Mar 17 18:46:54.447801 systemd[1]: Started logrotate.timer. Mar 17 18:46:54.448614 systemd[1]: Started mdadm.timer. Mar 17 18:46:54.449263 systemd[1]: Reached target timers.target. Mar 17 18:46:54.450234 systemd[1]: Listening on dbus.socket. Mar 17 18:46:54.451755 systemd[1]: Starting docker.socket... Mar 17 18:46:54.454224 systemd[1]: Listening on sshd.socket. Mar 17 18:46:54.455151 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:46:54.455646 systemd[1]: Listening on docker.socket. Mar 17 18:46:54.456453 systemd[1]: Reached target sockets.target. Mar 17 18:46:54.457219 systemd[1]: Reached target basic.target. Mar 17 18:46:54.458006 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.458028 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:46:54.458886 systemd[1]: Starting containerd.service... Mar 17 18:46:54.460395 systemd[1]: Starting dbus.service... Mar 17 18:46:54.461799 systemd[1]: Starting enable-oem-cloudinit.service... Mar 17 18:46:54.463408 systemd[1]: Starting extend-filesystems.service... Mar 17 18:46:54.464228 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Mar 17 18:46:54.465065 systemd[1]: Starting motdgen.service... Mar 17 18:46:54.466573 systemd[1]: Starting ssh-key-proc-cmdline.service... Mar 17 18:46:54.468468 systemd[1]: Starting sshd-keygen.service... Mar 17 18:46:54.471002 systemd[1]: Starting systemd-logind.service... Mar 17 18:46:54.473599 jq[1179]: false Mar 17 18:46:54.471852 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:46:54.471900 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Mar 17 18:46:54.472213 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Mar 17 18:46:54.472719 systemd[1]: Starting update-engine.service... Mar 17 18:46:54.474289 systemd[1]: Starting update-ssh-keys-after-ignition.service... Mar 17 18:46:54.476590 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Mar 17 18:46:54.477910 jq[1189]: true Mar 17 18:46:54.476750 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Mar 17 18:46:54.478393 dbus-daemon[1178]: [system] SELinux support is enabled Mar 17 18:46:54.478498 systemd[1]: Started dbus.service. Mar 17 18:46:54.481801 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Mar 17 18:46:54.481822 systemd[1]: Reached target system-config.target. Mar 17 18:46:54.482757 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Mar 17 18:46:54.482772 systemd[1]: Reached target user-config.target. Mar 17 18:46:54.490455 extend-filesystems[1180]: Found loop1 Mar 17 18:46:54.490455 extend-filesystems[1180]: Found sr0 Mar 17 18:46:54.490455 extend-filesystems[1180]: Found vda Mar 17 18:46:54.490455 extend-filesystems[1180]: Found vda1 Mar 17 18:46:54.490455 extend-filesystems[1180]: Found vda2 Mar 17 18:46:54.490455 extend-filesystems[1180]: Found vda3 Mar 17 18:46:54.490455 extend-filesystems[1180]: Found usr Mar 17 18:46:54.490455 extend-filesystems[1180]: Found vda4 Mar 17 18:46:54.490455 extend-filesystems[1180]: Found vda6 Mar 17 18:46:54.490455 extend-filesystems[1180]: Found vda7 Mar 17 18:46:54.490455 extend-filesystems[1180]: Found vda9 Mar 17 18:46:54.490455 extend-filesystems[1180]: Checking size of /dev/vda9 Mar 17 18:46:54.509780 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Mar 17 18:46:54.484449 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Mar 17 18:46:54.509895 extend-filesystems[1180]: Resized partition /dev/vda9 Mar 17 18:46:54.510890 jq[1191]: true Mar 17 18:46:54.484578 systemd[1]: Finished ssh-key-proc-cmdline.service. Mar 17 18:46:54.511123 extend-filesystems[1209]: resize2fs 1.46.5 (30-Dec-2021) Mar 17 18:46:54.491237 systemd[1]: motdgen.service: Deactivated successfully. Mar 17 18:46:54.513026 update_engine[1188]: I0317 18:46:54.511636 1188 main.cc:92] Flatcar Update Engine starting Mar 17 18:46:54.491370 systemd[1]: Finished motdgen.service. Mar 17 18:46:54.513113 systemd[1]: Started update-engine.service. Mar 17 18:46:54.518342 update_engine[1188]: I0317 18:46:54.513152 1188 update_check_scheduler.cc:74] Next update check in 6m45s Mar 17 18:46:54.515488 systemd[1]: Started locksmithd.service. Mar 17 18:46:54.520884 systemd-logind[1186]: Watching system buttons on /dev/input/event1 (Power Button) Mar 17 18:46:54.520914 systemd-logind[1186]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Mar 17 18:46:54.521274 systemd-logind[1186]: New seat seat0. Mar 17 18:46:54.527220 systemd[1]: Started systemd-logind.service. Mar 17 18:46:54.532275 env[1192]: time="2025-03-17T18:46:54.531807676Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Mar 17 18:46:54.543700 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Mar 17 18:46:54.550606 env[1192]: time="2025-03-17T18:46:54.550572958Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 17 18:46:54.570997 env[1192]: time="2025-03-17T18:46:54.570907212Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:46:54.571217 extend-filesystems[1209]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Mar 17 18:46:54.571217 extend-filesystems[1209]: old_desc_blocks = 1, new_desc_blocks = 1 Mar 17 18:46:54.571217 extend-filesystems[1209]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Mar 17 18:46:54.574168 locksmithd[1222]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Mar 17 18:46:54.575712 extend-filesystems[1180]: Resized filesystem in /dev/vda9 Mar 17 18:46:54.576916 env[1192]: time="2025-03-17T18:46:54.576849987Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.179-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:46:54.576916 env[1192]: time="2025-03-17T18:46:54.576886064Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:46:54.577141 env[1192]: time="2025-03-17T18:46:54.577109584Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:46:54.577141 env[1192]: time="2025-03-17T18:46:54.577132456Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 17 18:46:54.577195 env[1192]: time="2025-03-17T18:46:54.577144589Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 17 18:46:54.577195 env[1192]: time="2025-03-17T18:46:54.577154097Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 17 18:46:54.577238 env[1192]: time="2025-03-17T18:46:54.577218408Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:46:54.577375 systemd[1]: extend-filesystems.service: Deactivated successfully. Mar 17 18:46:54.577453 env[1192]: time="2025-03-17T18:46:54.577409787Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:46:54.577536 env[1192]: time="2025-03-17T18:46:54.577517078Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:46:54.577536 env[1192]: time="2025-03-17T18:46:54.577535412Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 17 18:46:54.577833 env[1192]: time="2025-03-17T18:46:54.577575517Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 17 18:46:54.577833 env[1192]: time="2025-03-17T18:46:54.577586959Z" level=info msg="metadata content store policy set" policy=shared Mar 17 18:46:54.577588 systemd[1]: Finished extend-filesystems.service. Mar 17 18:46:54.579193 bash[1226]: Updated "/home/core/.ssh/authorized_keys" Mar 17 18:46:54.579764 systemd[1]: Finished update-ssh-keys-after-ignition.service. Mar 17 18:46:54.584197 env[1192]: time="2025-03-17T18:46:54.584164544Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 17 18:46:54.584197 env[1192]: time="2025-03-17T18:46:54.584190773Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 17 18:46:54.584265 env[1192]: time="2025-03-17T18:46:54.584203868Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 17 18:46:54.584265 env[1192]: time="2025-03-17T18:46:54.584236599Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 17 18:46:54.584265 env[1192]: time="2025-03-17T18:46:54.584249604Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 17 18:46:54.584265 env[1192]: time="2025-03-17T18:46:54.584261716Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 17 18:46:54.584360 env[1192]: time="2025-03-17T18:46:54.584273969Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 17 18:46:54.584360 env[1192]: time="2025-03-17T18:46:54.584327289Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 17 18:46:54.584360 env[1192]: time="2025-03-17T18:46:54.584348018Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 17 18:46:54.584360 env[1192]: time="2025-03-17T18:46:54.584360031Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 17 18:46:54.584437 env[1192]: time="2025-03-17T18:46:54.584373486Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 17 18:46:54.584437 env[1192]: time="2025-03-17T18:46:54.584386220Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 17 18:46:54.584477 env[1192]: time="2025-03-17T18:46:54.584457494Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 17 18:46:54.584545 env[1192]: time="2025-03-17T18:46:54.584518839Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.584826295Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.584877281Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.584891958Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.584949246Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.584975395Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.584988039Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.585001163Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.585012845Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.585025659Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.585037802Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.585048752Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.585062779Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.585180650Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.585195027Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586090 env[1192]: time="2025-03-17T18:46:54.585210766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586389 env[1192]: time="2025-03-17T18:46:54.585222578Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 17 18:46:54.586389 env[1192]: time="2025-03-17T18:46:54.585238488Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 17 18:46:54.586389 env[1192]: time="2025-03-17T18:46:54.585249148Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 17 18:46:54.586389 env[1192]: time="2025-03-17T18:46:54.585265549Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 17 18:46:54.586389 env[1192]: time="2025-03-17T18:46:54.585297940Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 17 18:46:54.586487 env[1192]: time="2025-03-17T18:46:54.585479340Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 17 18:46:54.586487 env[1192]: time="2025-03-17T18:46:54.585526448Z" level=info msg="Connect containerd service" Mar 17 18:46:54.586487 env[1192]: time="2025-03-17T18:46:54.585560773Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 17 18:46:54.586487 env[1192]: time="2025-03-17T18:46:54.586062083Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:46:54.587111 env[1192]: time="2025-03-17T18:46:54.586671195Z" level=info msg="Start subscribing containerd event" Mar 17 18:46:54.587111 env[1192]: time="2025-03-17T18:46:54.586719636Z" level=info msg="Start recovering state" Mar 17 18:46:54.587188 env[1192]: time="2025-03-17T18:46:54.587172054Z" level=info msg="Start event monitor" Mar 17 18:46:54.587266 env[1192]: time="2025-03-17T18:46:54.587248838Z" level=info msg="Start snapshots syncer" Mar 17 18:46:54.587356 env[1192]: time="2025-03-17T18:46:54.587339308Z" level=info msg="Start cni network conf syncer for default" Mar 17 18:46:54.587425 env[1192]: time="2025-03-17T18:46:54.587408047Z" level=info msg="Start streaming server" Mar 17 18:46:54.587750 env[1192]: time="2025-03-17T18:46:54.587716806Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 17 18:46:54.587883 env[1192]: time="2025-03-17T18:46:54.587868220Z" level=info msg=serving... address=/run/containerd/containerd.sock Mar 17 18:46:54.587998 env[1192]: time="2025-03-17T18:46:54.587983326Z" level=info msg="containerd successfully booted in 0.062898s" Mar 17 18:46:54.588025 systemd[1]: Started containerd.service. Mar 17 18:46:55.510908 systemd-networkd[1026]: eth0: Gained IPv6LL Mar 17 18:46:55.512565 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 18:46:55.513883 systemd[1]: Reached target network-online.target. Mar 17 18:46:55.516121 systemd[1]: Starting kubelet.service... Mar 17 18:46:55.645362 sshd_keygen[1195]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Mar 17 18:46:55.663302 systemd[1]: Finished sshd-keygen.service. Mar 17 18:46:55.665562 systemd[1]: Starting issuegen.service... Mar 17 18:46:55.670044 systemd[1]: issuegen.service: Deactivated successfully. Mar 17 18:46:55.670161 systemd[1]: Finished issuegen.service. Mar 17 18:46:55.672060 systemd[1]: Starting systemd-user-sessions.service... Mar 17 18:46:55.677873 systemd[1]: Finished systemd-user-sessions.service. Mar 17 18:46:55.680504 systemd[1]: Started getty@tty1.service. Mar 17 18:46:55.682831 systemd[1]: Started serial-getty@ttyS0.service. Mar 17 18:46:55.683876 systemd[1]: Reached target getty.target. Mar 17 18:46:56.071377 systemd[1]: Started kubelet.service. Mar 17 18:46:56.072509 systemd[1]: Reached target multi-user.target. Mar 17 18:46:56.074386 systemd[1]: Starting systemd-update-utmp-runlevel.service... Mar 17 18:46:56.080804 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 17 18:46:56.080929 systemd[1]: Finished systemd-update-utmp-runlevel.service. Mar 17 18:46:56.082039 systemd[1]: Startup finished in 587ms (kernel) + 4.029s (initrd) + 5.362s (userspace) = 9.979s. Mar 17 18:46:56.465791 kubelet[1255]: E0317 18:46:56.465654 1255 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:46:56.467642 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:46:56.467773 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:47:04.032644 systemd[1]: Created slice system-sshd.slice. Mar 17 18:47:04.033591 systemd[1]: Started sshd@0-10.0.0.143:22-10.0.0.1:58158.service. Mar 17 18:47:04.066105 sshd[1264]: Accepted publickey for core from 10.0.0.1 port 58158 ssh2: RSA SHA256:DYcGKLA+BUI3KXBOyjzF6/uTec/cV0nLMAEcssN4/64 Mar 17 18:47:04.067418 sshd[1264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:47:04.075263 systemd-logind[1186]: New session 1 of user core. Mar 17 18:47:04.076218 systemd[1]: Created slice user-500.slice. Mar 17 18:47:04.077265 systemd[1]: Starting user-runtime-dir@500.service... Mar 17 18:47:04.084433 systemd[1]: Finished user-runtime-dir@500.service. Mar 17 18:47:04.085604 systemd[1]: Starting user@500.service... Mar 17 18:47:04.087996 (systemd)[1267]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:47:04.149782 systemd[1267]: Queued start job for default target default.target. Mar 17 18:47:04.150145 systemd[1267]: Reached target paths.target. Mar 17 18:47:04.150173 systemd[1267]: Reached target sockets.target. Mar 17 18:47:04.150189 systemd[1267]: Reached target timers.target. Mar 17 18:47:04.150202 systemd[1267]: Reached target basic.target. Mar 17 18:47:04.150242 systemd[1267]: Reached target default.target. Mar 17 18:47:04.150271 systemd[1267]: Startup finished in 57ms. Mar 17 18:47:04.150307 systemd[1]: Started user@500.service. Mar 17 18:47:04.151176 systemd[1]: Started session-1.scope. Mar 17 18:47:04.201141 systemd[1]: Started sshd@1-10.0.0.143:22-10.0.0.1:58170.service. Mar 17 18:47:04.233257 sshd[1276]: Accepted publickey for core from 10.0.0.1 port 58170 ssh2: RSA SHA256:DYcGKLA+BUI3KXBOyjzF6/uTec/cV0nLMAEcssN4/64 Mar 17 18:47:04.234283 sshd[1276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:47:04.237653 systemd-logind[1186]: New session 2 of user core. Mar 17 18:47:04.238595 systemd[1]: Started session-2.scope. Mar 17 18:47:04.291352 sshd[1276]: pam_unix(sshd:session): session closed for user core Mar 17 18:47:04.294214 systemd[1]: sshd@1-10.0.0.143:22-10.0.0.1:58170.service: Deactivated successfully. Mar 17 18:47:04.294725 systemd[1]: session-2.scope: Deactivated successfully. Mar 17 18:47:04.295217 systemd-logind[1186]: Session 2 logged out. Waiting for processes to exit. Mar 17 18:47:04.296194 systemd[1]: Started sshd@2-10.0.0.143:22-10.0.0.1:58176.service. Mar 17 18:47:04.296821 systemd-logind[1186]: Removed session 2. Mar 17 18:47:04.325406 sshd[1282]: Accepted publickey for core from 10.0.0.1 port 58176 ssh2: RSA SHA256:DYcGKLA+BUI3KXBOyjzF6/uTec/cV0nLMAEcssN4/64 Mar 17 18:47:04.326346 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:47:04.329203 systemd-logind[1186]: New session 3 of user core. Mar 17 18:47:04.329866 systemd[1]: Started session-3.scope. Mar 17 18:47:04.378035 sshd[1282]: pam_unix(sshd:session): session closed for user core Mar 17 18:47:04.380714 systemd[1]: sshd@2-10.0.0.143:22-10.0.0.1:58176.service: Deactivated successfully. Mar 17 18:47:04.381190 systemd[1]: session-3.scope: Deactivated successfully. Mar 17 18:47:04.381649 systemd-logind[1186]: Session 3 logged out. Waiting for processes to exit. Mar 17 18:47:04.382625 systemd[1]: Started sshd@3-10.0.0.143:22-10.0.0.1:58182.service. Mar 17 18:47:04.383389 systemd-logind[1186]: Removed session 3. Mar 17 18:47:04.411584 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 58182 ssh2: RSA SHA256:DYcGKLA+BUI3KXBOyjzF6/uTec/cV0nLMAEcssN4/64 Mar 17 18:47:04.412498 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:47:04.415324 systemd-logind[1186]: New session 4 of user core. Mar 17 18:47:04.415991 systemd[1]: Started session-4.scope. Mar 17 18:47:04.467943 sshd[1288]: pam_unix(sshd:session): session closed for user core Mar 17 18:47:04.470243 systemd[1]: sshd@3-10.0.0.143:22-10.0.0.1:58182.service: Deactivated successfully. Mar 17 18:47:04.470695 systemd[1]: session-4.scope: Deactivated successfully. Mar 17 18:47:04.471136 systemd-logind[1186]: Session 4 logged out. Waiting for processes to exit. Mar 17 18:47:04.472002 systemd[1]: Started sshd@4-10.0.0.143:22-10.0.0.1:58194.service. Mar 17 18:47:04.472577 systemd-logind[1186]: Removed session 4. Mar 17 18:47:04.500746 sshd[1294]: Accepted publickey for core from 10.0.0.1 port 58194 ssh2: RSA SHA256:DYcGKLA+BUI3KXBOyjzF6/uTec/cV0nLMAEcssN4/64 Mar 17 18:47:04.501640 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:47:04.504327 systemd-logind[1186]: New session 5 of user core. Mar 17 18:47:04.504998 systemd[1]: Started session-5.scope. Mar 17 18:47:04.558143 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Mar 17 18:47:04.558333 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:47:04.564875 dbus-daemon[1178]: \xd0\xdd\xe1}.V: received setenforce notice (enforcing=-1417522480) Mar 17 18:47:04.567035 sudo[1297]: pam_unix(sudo:session): session closed for user root Mar 17 18:47:04.568583 sshd[1294]: pam_unix(sshd:session): session closed for user core Mar 17 18:47:04.571104 systemd[1]: sshd@4-10.0.0.143:22-10.0.0.1:58194.service: Deactivated successfully. Mar 17 18:47:04.571551 systemd[1]: session-5.scope: Deactivated successfully. Mar 17 18:47:04.572017 systemd-logind[1186]: Session 5 logged out. Waiting for processes to exit. Mar 17 18:47:04.572964 systemd[1]: Started sshd@5-10.0.0.143:22-10.0.0.1:58198.service. Mar 17 18:47:04.573636 systemd-logind[1186]: Removed session 5. Mar 17 18:47:04.601965 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 58198 ssh2: RSA SHA256:DYcGKLA+BUI3KXBOyjzF6/uTec/cV0nLMAEcssN4/64 Mar 17 18:47:04.603097 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:47:04.605812 systemd-logind[1186]: New session 6 of user core. Mar 17 18:47:04.606465 systemd[1]: Started session-6.scope. Mar 17 18:47:04.657477 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Mar 17 18:47:04.657686 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:47:04.659860 sudo[1305]: pam_unix(sudo:session): session closed for user root Mar 17 18:47:04.664177 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Mar 17 18:47:04.664361 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:47:04.671656 systemd[1]: Stopping audit-rules.service... Mar 17 18:47:04.671000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:47:04.673020 auditctl[1308]: No rules Mar 17 18:47:04.673909 systemd[1]: audit-rules.service: Deactivated successfully. Mar 17 18:47:04.674060 systemd[1]: Stopped audit-rules.service. Mar 17 18:47:04.675472 systemd[1]: Starting audit-rules.service... Mar 17 18:47:04.675727 kernel: kauditd_printk_skb: 227 callbacks suppressed Mar 17 18:47:04.675785 kernel: audit: type=1305 audit(1742237224.671:203): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:47:04.675805 kernel: audit: type=1300 audit(1742237224.671:203): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffddeca2f30 a2=420 a3=0 items=0 ppid=1 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:04.671000 audit[1308]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffddeca2f30 a2=420 a3=0 items=0 ppid=1 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:04.679902 kernel: audit: type=1327 audit(1742237224.671:203): proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:47:04.671000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:47:04.681188 kernel: audit: type=1131 audit(1742237224.672:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.692250 augenrules[1325]: No rules Mar 17 18:47:04.692891 systemd[1]: Finished audit-rules.service. Mar 17 18:47:04.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.693828 sudo[1304]: pam_unix(sudo:session): session closed for user root Mar 17 18:47:04.694958 sshd[1301]: pam_unix(sshd:session): session closed for user core Mar 17 18:47:04.692000 audit[1304]: USER_END pid=1304 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.697219 systemd[1]: sshd@5-10.0.0.143:22-10.0.0.1:58198.service: Deactivated successfully. Mar 17 18:47:04.697656 systemd[1]: session-6.scope: Deactivated successfully. Mar 17 18:47:04.698121 systemd-logind[1186]: Session 6 logged out. Waiting for processes to exit. Mar 17 18:47:04.698850 systemd[1]: Started sshd@6-10.0.0.143:22-10.0.0.1:58204.service. Mar 17 18:47:04.699602 systemd-logind[1186]: Removed session 6. Mar 17 18:47:04.699992 kernel: audit: type=1130 audit(1742237224.691:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.700022 kernel: audit: type=1106 audit(1742237224.692:206): pid=1304 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.700041 kernel: audit: type=1104 audit(1742237224.692:207): pid=1304 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.692000 audit[1304]: CRED_DISP pid=1304 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.694000 audit[1301]: USER_END pid=1301 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Mar 17 18:47:04.707427 kernel: audit: type=1106 audit(1742237224.694:208): pid=1301 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Mar 17 18:47:04.707486 kernel: audit: type=1104 audit(1742237224.694:209): pid=1301 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Mar 17 18:47:04.694000 audit[1301]: CRED_DISP pid=1301 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Mar 17 18:47:04.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.143:22-10.0.0.1:58198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.714367 kernel: audit: type=1131 audit(1742237224.695:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.143:22-10.0.0.1:58198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.143:22-10.0.0.1:58204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.728000 audit[1331]: USER_ACCT pid=1331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Mar 17 18:47:04.729097 sshd[1331]: Accepted publickey for core from 10.0.0.1 port 58204 ssh2: RSA SHA256:DYcGKLA+BUI3KXBOyjzF6/uTec/cV0nLMAEcssN4/64 Mar 17 18:47:04.729000 audit[1331]: CRED_ACQ pid=1331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Mar 17 18:47:04.729000 audit[1331]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe49c21740 a2=3 a3=0 items=0 ppid=1 pid=1331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:04.729000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:47:04.730006 sshd[1331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:47:04.733083 systemd-logind[1186]: New session 7 of user core. Mar 17 18:47:04.733795 systemd[1]: Started session-7.scope. Mar 17 18:47:04.736000 audit[1331]: USER_START pid=1331 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Mar 17 18:47:04.737000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Mar 17 18:47:04.784000 audit[1334]: USER_ACCT pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.784000 audit[1334]: CRED_REFR pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.784757 sudo[1334]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Mar 17 18:47:04.784961 sudo[1334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:47:04.785000 audit[1334]: USER_START pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.796021 systemd[1]: Starting coreos-metadata.service... Mar 17 18:47:04.802249 systemd[1]: coreos-metadata.service: Deactivated successfully. Mar 17 18:47:04.802373 systemd[1]: Finished coreos-metadata.service. Mar 17 18:47:04.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:04.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:05.212783 systemd[1]: Stopped kubelet.service. Mar 17 18:47:05.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:05.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:05.214957 systemd[1]: Starting kubelet.service... Mar 17 18:47:05.234061 systemd[1]: Reloading. Mar 17 18:47:05.302204 /usr/lib/systemd/system-generators/torcx-generator[1390]: time="2025-03-17T18:47:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:47:05.302238 /usr/lib/systemd/system-generators/torcx-generator[1390]: time="2025-03-17T18:47:05Z" level=info msg="torcx already run" Mar 17 18:47:06.182401 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:47:06.182417 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:47:06.199612 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit: BPF prog-id=43 op=LOAD Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.254000 audit: BPF prog-id=44 op=LOAD Mar 17 18:47:06.254000 audit: BPF prog-id=27 op=UNLOAD Mar 17 18:47:06.254000 audit: BPF prog-id=28 op=UNLOAD Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit: BPF prog-id=45 op=LOAD Mar 17 18:47:06.255000 audit: BPF prog-id=36 op=UNLOAD Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit: BPF prog-id=46 op=LOAD Mar 17 18:47:06.256000 audit: BPF prog-id=29 op=UNLOAD Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit: BPF prog-id=47 op=LOAD Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.256000 audit: BPF prog-id=48 op=LOAD Mar 17 18:47:06.256000 audit: BPF prog-id=30 op=UNLOAD Mar 17 18:47:06.256000 audit: BPF prog-id=31 op=UNLOAD Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit: BPF prog-id=49 op=LOAD Mar 17 18:47:06.257000 audit: BPF prog-id=37 op=UNLOAD Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.257000 audit: BPF prog-id=50 op=LOAD Mar 17 18:47:06.258000 audit: BPF prog-id=41 op=UNLOAD Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit: BPF prog-id=51 op=LOAD Mar 17 18:47:06.258000 audit: BPF prog-id=32 op=UNLOAD Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit: BPF prog-id=52 op=LOAD Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.258000 audit: BPF prog-id=53 op=LOAD Mar 17 18:47:06.258000 audit: BPF prog-id=33 op=UNLOAD Mar 17 18:47:06.258000 audit: BPF prog-id=34 op=UNLOAD Mar 17 18:47:06.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.259000 audit: BPF prog-id=54 op=LOAD Mar 17 18:47:06.259000 audit: BPF prog-id=35 op=UNLOAD Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit: BPF prog-id=55 op=LOAD Mar 17 18:47:06.261000 audit: BPF prog-id=38 op=UNLOAD Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.262000 audit: BPF prog-id=56 op=LOAD Mar 17 18:47:06.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.262000 audit: BPF prog-id=57 op=LOAD Mar 17 18:47:06.262000 audit: BPF prog-id=39 op=UNLOAD Mar 17 18:47:06.262000 audit: BPF prog-id=40 op=UNLOAD Mar 17 18:47:06.272363 systemd[1]: Started kubelet.service. Mar 17 18:47:06.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:06.273909 systemd[1]: Stopping kubelet.service... Mar 17 18:47:06.274138 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 18:47:06.274306 systemd[1]: Stopped kubelet.service. Mar 17 18:47:06.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:06.275675 systemd[1]: Starting kubelet.service... Mar 17 18:47:06.347129 systemd[1]: Started kubelet.service. Mar 17 18:47:06.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:06.379045 kubelet[1439]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:47:06.379045 kubelet[1439]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Mar 17 18:47:06.379045 kubelet[1439]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:47:06.379313 kubelet[1439]: I0317 18:47:06.379090 1439 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 18:47:06.548670 kubelet[1439]: I0317 18:47:06.548555 1439 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Mar 17 18:47:06.548670 kubelet[1439]: I0317 18:47:06.548581 1439 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 18:47:06.548869 kubelet[1439]: I0317 18:47:06.548846 1439 server.go:929] "Client rotation is on, will bootstrap in background" Mar 17 18:47:06.565690 kubelet[1439]: I0317 18:47:06.565652 1439 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 18:47:06.573962 kubelet[1439]: E0317 18:47:06.573926 1439 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Mar 17 18:47:06.573962 kubelet[1439]: I0317 18:47:06.573956 1439 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Mar 17 18:47:06.578317 kubelet[1439]: I0317 18:47:06.578296 1439 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 18:47:06.579351 kubelet[1439]: I0317 18:47:06.579326 1439 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Mar 17 18:47:06.579470 kubelet[1439]: I0317 18:47:06.579433 1439 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 18:47:06.579621 kubelet[1439]: I0317 18:47:06.579457 1439 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.143","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Mar 17 18:47:06.579621 kubelet[1439]: I0317 18:47:06.579615 1439 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 18:47:06.579621 kubelet[1439]: I0317 18:47:06.579623 1439 container_manager_linux.go:300] "Creating device plugin manager" Mar 17 18:47:06.579771 kubelet[1439]: I0317 18:47:06.579721 1439 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:47:06.582192 kubelet[1439]: I0317 18:47:06.582169 1439 kubelet.go:408] "Attempting to sync node with API server" Mar 17 18:47:06.582192 kubelet[1439]: I0317 18:47:06.582190 1439 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 18:47:06.582265 kubelet[1439]: I0317 18:47:06.582218 1439 kubelet.go:314] "Adding apiserver pod source" Mar 17 18:47:06.582265 kubelet[1439]: I0317 18:47:06.582232 1439 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 18:47:06.582310 kubelet[1439]: E0317 18:47:06.582273 1439 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:06.582310 kubelet[1439]: E0317 18:47:06.582300 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:06.589099 kubelet[1439]: W0317 18:47:06.589080 1439 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.143" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Mar 17 18:47:06.589153 kubelet[1439]: E0317 18:47:06.589108 1439 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.143\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Mar 17 18:47:06.591542 kubelet[1439]: I0317 18:47:06.591524 1439 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 18:47:06.596595 kubelet[1439]: I0317 18:47:06.596574 1439 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 18:47:06.597008 kubelet[1439]: W0317 18:47:06.596987 1439 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Mar 17 18:47:06.597435 kubelet[1439]: I0317 18:47:06.597420 1439 server.go:1269] "Started kubelet" Mar 17 18:47:06.598160 kubelet[1439]: I0317 18:47:06.597699 1439 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 18:47:06.598160 kubelet[1439]: I0317 18:47:06.598036 1439 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 18:47:06.598160 kubelet[1439]: I0317 18:47:06.598083 1439 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 18:47:06.596000 audit[1439]: AVC avc: denied { mac_admin } for pid=1439 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.596000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:47:06.596000 audit[1439]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000901fb0 a1=c000b603a8 a2=c000901f80 a3=25 items=0 ppid=1 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:47:06.596000 audit[1439]: AVC avc: denied { mac_admin } for pid=1439 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.596000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:47:06.596000 audit[1439]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007ad060 a1=c000b603c0 a2=c000b62060 a3=25 items=0 ppid=1 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:47:06.599035 kubelet[1439]: I0317 18:47:06.598613 1439 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 18:47:06.599035 kubelet[1439]: I0317 18:47:06.598691 1439 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Mar 17 18:47:06.599035 kubelet[1439]: I0317 18:47:06.598741 1439 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 18:47:06.599035 kubelet[1439]: I0317 18:47:06.598936 1439 server.go:460] "Adding debug handlers to kubelet server" Mar 17 18:47:06.599638 kubelet[1439]: I0317 18:47:06.599612 1439 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Mar 17 18:47:06.602308 kubelet[1439]: I0317 18:47:06.602292 1439 volume_manager.go:289] "Starting Kubelet Volume Manager" Mar 17 18:47:06.602387 kubelet[1439]: I0317 18:47:06.602382 1439 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Mar 17 18:47:06.602606 kubelet[1439]: I0317 18:47:06.602591 1439 reconciler.go:26] "Reconciler: start to sync state" Mar 17 18:47:06.603190 kubelet[1439]: I0317 18:47:06.603168 1439 factory.go:221] Registration of the systemd container factory successfully Mar 17 18:47:06.603249 kubelet[1439]: I0317 18:47:06.603231 1439 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 18:47:06.604611 kubelet[1439]: E0317 18:47:06.604565 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:06.604686 kubelet[1439]: E0317 18:47:06.604655 1439 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 18:47:06.605069 kubelet[1439]: I0317 18:47:06.605052 1439 factory.go:221] Registration of the containerd container factory successfully Mar 17 18:47:06.611323 kubelet[1439]: E0317 18:47:06.611291 1439 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.143\" not found" node="10.0.0.143" Mar 17 18:47:06.614695 kubelet[1439]: I0317 18:47:06.614172 1439 cpu_manager.go:214] "Starting CPU manager" policy="none" Mar 17 18:47:06.614695 kubelet[1439]: I0317 18:47:06.614186 1439 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Mar 17 18:47:06.614695 kubelet[1439]: I0317 18:47:06.614202 1439 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:47:06.705175 kubelet[1439]: E0317 18:47:06.705131 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:06.805731 kubelet[1439]: E0317 18:47:06.805649 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:06.865642 kubelet[1439]: I0317 18:47:06.865615 1439 policy_none.go:49] "None policy: Start" Mar 17 18:47:06.866270 kubelet[1439]: I0317 18:47:06.866231 1439 memory_manager.go:170] "Starting memorymanager" policy="None" Mar 17 18:47:06.866270 kubelet[1439]: I0317 18:47:06.866270 1439 state_mem.go:35] "Initializing new in-memory state store" Mar 17 18:47:06.874981 systemd[1]: Created slice kubepods.slice. Mar 17 18:47:06.878407 systemd[1]: Created slice kubepods-besteffort.slice. Mar 17 18:47:06.878000 audit[1453]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:06.878000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe2a383ae0 a2=0 a3=7ffe2a383acc items=0 ppid=1439 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:47:06.879000 audit[1459]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:06.879000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffda781b960 a2=0 a3=7ffda781b94c items=0 ppid=1439 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.879000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:47:06.886715 systemd[1]: Created slice kubepods-burstable.slice. Mar 17 18:47:06.887703 kubelet[1439]: I0317 18:47:06.887661 1439 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 18:47:06.887000 audit[1439]: AVC avc: denied { mac_admin } for pid=1439 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:06.887000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:47:06.887000 audit[1439]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00037dd70 a1=c0007a44b0 a2=c00037dd10 a3=25 items=0 ppid=1 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.887000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:47:06.887899 kubelet[1439]: I0317 18:47:06.887742 1439 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 18:47:06.887899 kubelet[1439]: I0317 18:47:06.887835 1439 eviction_manager.go:189] "Eviction manager: starting control loop" Mar 17 18:47:06.887899 kubelet[1439]: I0317 18:47:06.887843 1439 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 18:47:06.888573 kubelet[1439]: I0317 18:47:06.888548 1439 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 18:47:06.889400 kubelet[1439]: E0317 18:47:06.889385 1439 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.143\" not found" Mar 17 18:47:06.881000 audit[1461]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:06.881000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd001eb8f0 a2=0 a3=7ffd001eb8dc items=0 ppid=1439 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:47:06.901000 audit[1466]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:06.901000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc80ea4ed0 a2=0 a3=7ffc80ea4ebc items=0 ppid=1439 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:47:06.933000 audit[1471]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:06.933000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdddee05b0 a2=0 a3=7ffdddee059c items=0 ppid=1439 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.933000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Mar 17 18:47:06.934359 kubelet[1439]: I0317 18:47:06.934312 1439 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 18:47:06.934000 audit[1472]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:06.934000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4f8dce30 a2=0 a3=7ffc4f8dce1c items=0 ppid=1439 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:47:06.934000 audit[1473]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:06.934000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc921ab00 a2=0 a3=7ffcc921aaec items=0 ppid=1439 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:47:06.935474 kubelet[1439]: I0317 18:47:06.935283 1439 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 18:47:06.935474 kubelet[1439]: I0317 18:47:06.935314 1439 status_manager.go:217] "Starting to sync pod status with apiserver" Mar 17 18:47:06.935474 kubelet[1439]: I0317 18:47:06.935333 1439 kubelet.go:2321] "Starting kubelet main sync loop" Mar 17 18:47:06.935474 kubelet[1439]: E0317 18:47:06.935457 1439 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Mar 17 18:47:06.935000 audit[1474]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:06.935000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea24e4940 a2=0 a3=7ffea24e492c items=0 ppid=1439 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.935000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:47:06.935000 audit[1475]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:06.935000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff9be65f00 a2=0 a3=7fff9be65eec items=0 ppid=1439 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.935000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:47:06.936000 audit[1476]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:06.936000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff3cbce8b0 a2=0 a3=7fff3cbce89c items=0 ppid=1439 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.936000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:47:06.936000 audit[1477]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:06.936000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb5250510 a2=0 a3=7fffb52504fc items=0 ppid=1439 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.936000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:47:06.937000 audit[1478]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:06.937000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcac0d08d0 a2=0 a3=7ffcac0d08bc items=0 ppid=1439 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:06.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:47:06.949173 kubelet[1439]: E0317 18:47:06.949145 1439 csi_plugin.go:305] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.143" not found Mar 17 18:47:06.988600 kubelet[1439]: I0317 18:47:06.988583 1439 kubelet_node_status.go:72] "Attempting to register node" node="10.0.0.143" Mar 17 18:47:06.993482 kubelet[1439]: I0317 18:47:06.993464 1439 kubelet_node_status.go:75] "Successfully registered node" node="10.0.0.143" Mar 17 18:47:06.993482 kubelet[1439]: E0317 18:47:06.993486 1439 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.0.0.143\": node \"10.0.0.143\" not found" Mar 17 18:47:07.000703 kubelet[1439]: E0317 18:47:07.000655 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:07.101333 kubelet[1439]: E0317 18:47:07.101257 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:07.201821 kubelet[1439]: E0317 18:47:07.201796 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:07.302455 kubelet[1439]: E0317 18:47:07.302426 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:07.368000 audit[1334]: USER_END pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:47:07.368000 audit[1334]: CRED_DISP pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:47:07.369251 sudo[1334]: pam_unix(sudo:session): session closed for user root Mar 17 18:47:07.370423 sshd[1331]: pam_unix(sshd:session): session closed for user core Mar 17 18:47:07.370000 audit[1331]: USER_END pid=1331 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Mar 17 18:47:07.370000 audit[1331]: CRED_DISP pid=1331 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Mar 17 18:47:07.372800 systemd[1]: sshd@6-10.0.0.143:22-10.0.0.1:58204.service: Deactivated successfully. Mar 17 18:47:07.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.143:22-10.0.0.1:58204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:07.373433 systemd[1]: session-7.scope: Deactivated successfully. Mar 17 18:47:07.373996 systemd-logind[1186]: Session 7 logged out. Waiting for processes to exit. Mar 17 18:47:07.374650 systemd-logind[1186]: Removed session 7. Mar 17 18:47:07.402971 kubelet[1439]: E0317 18:47:07.402939 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:07.503788 kubelet[1439]: E0317 18:47:07.503744 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:07.551355 kubelet[1439]: I0317 18:47:07.551311 1439 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Mar 17 18:47:07.551555 kubelet[1439]: W0317 18:47:07.551512 1439 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 18:47:07.551555 kubelet[1439]: W0317 18:47:07.551537 1439 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 18:47:07.551555 kubelet[1439]: W0317 18:47:07.551542 1439 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 18:47:07.582756 kubelet[1439]: E0317 18:47:07.582731 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:07.604572 kubelet[1439]: E0317 18:47:07.604547 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:07.705329 kubelet[1439]: E0317 18:47:07.705218 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:07.806084 kubelet[1439]: E0317 18:47:07.806057 1439 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Mar 17 18:47:07.907196 kubelet[1439]: I0317 18:47:07.907172 1439 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Mar 17 18:47:07.907431 env[1192]: time="2025-03-17T18:47:07.907394792Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Mar 17 18:47:07.907651 kubelet[1439]: I0317 18:47:07.907551 1439 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Mar 17 18:47:08.583101 kubelet[1439]: E0317 18:47:08.583075 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:08.583101 kubelet[1439]: I0317 18:47:08.583114 1439 apiserver.go:52] "Watching apiserver" Mar 17 18:47:08.585949 kubelet[1439]: E0317 18:47:08.585916 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6bp86" podUID="4f62d233-a2bf-4293-97c9-b918fbcd2fee" Mar 17 18:47:08.590549 systemd[1]: Created slice kubepods-besteffort-pod4c6d7606_3c30_44f0_a98f_b7edb986598a.slice. Mar 17 18:47:08.603321 kubelet[1439]: I0317 18:47:08.603300 1439 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Mar 17 18:47:08.603465 systemd[1]: Created slice kubepods-besteffort-pod67590e04_876b_4571_9e09_d4cf893b7db1.slice. Mar 17 18:47:08.613959 kubelet[1439]: I0317 18:47:08.613935 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-lib-modules\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614020 kubelet[1439]: I0317 18:47:08.613960 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-policysync\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614020 kubelet[1439]: I0317 18:47:08.613978 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4f62d233-a2bf-4293-97c9-b918fbcd2fee-kubelet-dir\") pod \"csi-node-driver-6bp86\" (UID: \"4f62d233-a2bf-4293-97c9-b918fbcd2fee\") " pod="calico-system/csi-node-driver-6bp86" Mar 17 18:47:08.614020 kubelet[1439]: I0317 18:47:08.613990 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4f62d233-a2bf-4293-97c9-b918fbcd2fee-socket-dir\") pod \"csi-node-driver-6bp86\" (UID: \"4f62d233-a2bf-4293-97c9-b918fbcd2fee\") " pod="calico-system/csi-node-driver-6bp86" Mar 17 18:47:08.614020 kubelet[1439]: I0317 18:47:08.614004 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4c6d7606-3c30-44f0-a98f-b7edb986598a-xtables-lock\") pod \"kube-proxy-xvnkv\" (UID: \"4c6d7606-3c30-44f0-a98f-b7edb986598a\") " pod="kube-system/kube-proxy-xvnkv" Mar 17 18:47:08.614020 kubelet[1439]: I0317 18:47:08.614017 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/67590e04-876b-4571-9e09-d4cf893b7db1-node-certs\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614125 kubelet[1439]: I0317 18:47:08.614050 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-bin-dir\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614125 kubelet[1439]: I0317 18:47:08.614089 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/67590e04-876b-4571-9e09-d4cf893b7db1-tigera-ca-bundle\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614125 kubelet[1439]: I0317 18:47:08.614108 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-var-run-calico\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614184 kubelet[1439]: I0317 18:47:08.614135 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jnw58\" (UniqueName: \"kubernetes.io/projected/67590e04-876b-4571-9e09-d4cf893b7db1-kube-api-access-jnw58\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614184 kubelet[1439]: I0317 18:47:08.614167 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4f62d233-a2bf-4293-97c9-b918fbcd2fee-registration-dir\") pod \"csi-node-driver-6bp86\" (UID: \"4f62d233-a2bf-4293-97c9-b918fbcd2fee\") " pod="calico-system/csi-node-driver-6bp86" Mar 17 18:47:08.614261 kubelet[1439]: I0317 18:47:08.614194 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p7xqc\" (UniqueName: \"kubernetes.io/projected/4f62d233-a2bf-4293-97c9-b918fbcd2fee-kube-api-access-p7xqc\") pod \"csi-node-driver-6bp86\" (UID: \"4f62d233-a2bf-4293-97c9-b918fbcd2fee\") " pod="calico-system/csi-node-driver-6bp86" Mar 17 18:47:08.614261 kubelet[1439]: I0317 18:47:08.614224 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4c6d7606-3c30-44f0-a98f-b7edb986598a-kube-proxy\") pod \"kube-proxy-xvnkv\" (UID: \"4c6d7606-3c30-44f0-a98f-b7edb986598a\") " pod="kube-system/kube-proxy-xvnkv" Mar 17 18:47:08.614261 kubelet[1439]: I0317 18:47:08.614238 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4c6d7606-3c30-44f0-a98f-b7edb986598a-lib-modules\") pod \"kube-proxy-xvnkv\" (UID: \"4c6d7606-3c30-44f0-a98f-b7edb986598a\") " pod="kube-system/kube-proxy-xvnkv" Mar 17 18:47:08.614327 kubelet[1439]: I0317 18:47:08.614259 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pz8h6\" (UniqueName: \"kubernetes.io/projected/4c6d7606-3c30-44f0-a98f-b7edb986598a-kube-api-access-pz8h6\") pod \"kube-proxy-xvnkv\" (UID: \"4c6d7606-3c30-44f0-a98f-b7edb986598a\") " pod="kube-system/kube-proxy-xvnkv" Mar 17 18:47:08.614327 kubelet[1439]: I0317 18:47:08.614286 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-xtables-lock\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614327 kubelet[1439]: I0317 18:47:08.614300 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-var-lib-calico\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614327 kubelet[1439]: I0317 18:47:08.614317 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-net-dir\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614406 kubelet[1439]: I0317 18:47:08.614332 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-log-dir\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614406 kubelet[1439]: I0317 18:47:08.614346 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-flexvol-driver-host\") pod \"calico-node-dqqt5\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " pod="calico-system/calico-node-dqqt5" Mar 17 18:47:08.614406 kubelet[1439]: I0317 18:47:08.614363 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4f62d233-a2bf-4293-97c9-b918fbcd2fee-varrun\") pod \"csi-node-driver-6bp86\" (UID: \"4f62d233-a2bf-4293-97c9-b918fbcd2fee\") " pod="calico-system/csi-node-driver-6bp86" Mar 17 18:47:08.715608 kubelet[1439]: I0317 18:47:08.715572 1439 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Mar 17 18:47:08.718698 kubelet[1439]: E0317 18:47:08.718684 1439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:47:08.718698 kubelet[1439]: W0317 18:47:08.718696 1439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:47:08.718798 kubelet[1439]: E0317 18:47:08.718709 1439 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:47:08.725606 kubelet[1439]: E0317 18:47:08.725582 1439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:47:08.725606 kubelet[1439]: W0317 18:47:08.725595 1439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:47:08.725606 kubelet[1439]: E0317 18:47:08.725606 1439 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:47:08.725838 kubelet[1439]: E0317 18:47:08.725816 1439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:47:08.725838 kubelet[1439]: W0317 18:47:08.725833 1439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:47:08.725838 kubelet[1439]: E0317 18:47:08.725846 1439 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:47:08.726642 kubelet[1439]: E0317 18:47:08.726621 1439 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:47:08.726642 kubelet[1439]: W0317 18:47:08.726638 1439 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:47:08.726736 kubelet[1439]: E0317 18:47:08.726647 1439 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:47:08.903569 kubelet[1439]: E0317 18:47:08.903463 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:08.904281 env[1192]: time="2025-03-17T18:47:08.904183397Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xvnkv,Uid:4c6d7606-3c30-44f0-a98f-b7edb986598a,Namespace:kube-system,Attempt:0,}" Mar 17 18:47:08.905457 kubelet[1439]: E0317 18:47:08.905388 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:08.906085 env[1192]: time="2025-03-17T18:47:08.906042662Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dqqt5,Uid:67590e04-876b-4571-9e09-d4cf893b7db1,Namespace:calico-system,Attempt:0,}" Mar 17 18:47:09.479947 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount927334769.mount: Deactivated successfully. Mar 17 18:47:09.486083 env[1192]: time="2025-03-17T18:47:09.486028642Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:09.486872 env[1192]: time="2025-03-17T18:47:09.486844779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:09.489291 env[1192]: time="2025-03-17T18:47:09.489254266Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:09.490330 env[1192]: time="2025-03-17T18:47:09.490287753Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:09.491577 env[1192]: time="2025-03-17T18:47:09.491545524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:09.492711 env[1192]: time="2025-03-17T18:47:09.492685409Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:09.493838 env[1192]: time="2025-03-17T18:47:09.493807493Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:09.495109 env[1192]: time="2025-03-17T18:47:09.495061446Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:09.512721 env[1192]: time="2025-03-17T18:47:09.512646152Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:47:09.512721 env[1192]: time="2025-03-17T18:47:09.512697984Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:47:09.512858 env[1192]: time="2025-03-17T18:47:09.512708779Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:47:09.513074 env[1192]: time="2025-03-17T18:47:09.513010274Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8 pid=1501 runtime=io.containerd.runc.v2 Mar 17 18:47:09.515355 env[1192]: time="2025-03-17T18:47:09.515307231Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:47:09.515355 env[1192]: time="2025-03-17T18:47:09.515335232Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:47:09.515488 env[1192]: time="2025-03-17T18:47:09.515440786Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:47:09.515717 env[1192]: time="2025-03-17T18:47:09.515675986Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f13470672ee3b0cc03f82b82366bfc7b0c8a055b8b974b8ee72525ee4828868 pid=1515 runtime=io.containerd.runc.v2 Mar 17 18:47:09.522687 systemd[1]: Started cri-containerd-6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8.scope. Mar 17 18:47:09.526045 systemd[1]: Started cri-containerd-8f13470672ee3b0cc03f82b82366bfc7b0c8a055b8b974b8ee72525ee4828868.scope. Mar 17 18:47:09.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit: BPF prog-id=58 op=LOAD Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1501 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:09.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363231376138363837303535323432393435316534646238623630 Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1501 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:09.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363231376138363837303535323432393435316534646238623630 Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.533000 audit: BPF prog-id=59 op=LOAD Mar 17 18:47:09.533000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003944e0 items=0 ppid=1501 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:09.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363231376138363837303535323432393435316534646238623630 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit: BPF prog-id=60 op=LOAD Mar 17 18:47:09.534000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000394528 items=0 ppid=1501 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:09.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363231376138363837303535323432393435316534646238623630 Mar 17 18:47:09.534000 audit: BPF prog-id=60 op=UNLOAD Mar 17 18:47:09.534000 audit: BPF prog-id=59 op=UNLOAD Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.534000 audit: BPF prog-id=61 op=LOAD Mar 17 18:47:09.534000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000394938 items=0 ppid=1501 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:09.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363231376138363837303535323432393435316534646238623630 Mar 17 18:47:09.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.538000 audit: BPF prog-id=62 op=LOAD Mar 17 18:47:09.540000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.540000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1515 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:09.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866313334373036373265653362306363303366383262383233363662 Mar 17 18:47:09.540000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.540000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1515 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:09.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866313334373036373265653362306363303366383262383233363662 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit: BPF prog-id=63 op=LOAD Mar 17 18:47:09.541000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000344720 items=0 ppid=1515 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:09.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866313334373036373265653362306363303366383262383233363662 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit: BPF prog-id=64 op=LOAD Mar 17 18:47:09.541000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000344768 items=0 ppid=1515 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:09.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866313334373036373265653362306363303366383262383233363662 Mar 17 18:47:09.541000 audit: BPF prog-id=64 op=UNLOAD Mar 17 18:47:09.541000 audit: BPF prog-id=63 op=UNLOAD Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:09.541000 audit: BPF prog-id=65 op=LOAD Mar 17 18:47:09.541000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000344b78 items=0 ppid=1515 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:09.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866313334373036373265653362306363303366383262383233363662 Mar 17 18:47:09.546176 env[1192]: time="2025-03-17T18:47:09.546129588Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dqqt5,Uid:67590e04-876b-4571-9e09-d4cf893b7db1,Namespace:calico-system,Attempt:0,} returns sandbox id \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\"" Mar 17 18:47:09.546796 kubelet[1439]: E0317 18:47:09.546774 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:09.548409 env[1192]: time="2025-03-17T18:47:09.548117029Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Mar 17 18:47:09.552758 env[1192]: time="2025-03-17T18:47:09.552726452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xvnkv,Uid:4c6d7606-3c30-44f0-a98f-b7edb986598a,Namespace:kube-system,Attempt:0,} returns sandbox id \"8f13470672ee3b0cc03f82b82366bfc7b0c8a055b8b974b8ee72525ee4828868\"" Mar 17 18:47:09.553266 kubelet[1439]: E0317 18:47:09.553248 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:09.583605 kubelet[1439]: E0317 18:47:09.583576 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:09.936238 kubelet[1439]: E0317 18:47:09.936124 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6bp86" podUID="4f62d233-a2bf-4293-97c9-b918fbcd2fee" Mar 17 18:47:10.583934 kubelet[1439]: E0317 18:47:10.583899 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:11.521035 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount140462048.mount: Deactivated successfully. Mar 17 18:47:11.584948 kubelet[1439]: E0317 18:47:11.584906 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:11.643422 env[1192]: time="2025-03-17T18:47:11.643367123Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:11.645039 env[1192]: time="2025-03-17T18:47:11.644988718Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:11.646361 env[1192]: time="2025-03-17T18:47:11.646332725Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:11.647571 env[1192]: time="2025-03-17T18:47:11.647541741Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:11.647939 env[1192]: time="2025-03-17T18:47:11.647914570Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Mar 17 18:47:11.649075 env[1192]: time="2025-03-17T18:47:11.649048611Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.7\"" Mar 17 18:47:11.649979 env[1192]: time="2025-03-17T18:47:11.649953966Z" level=info msg="CreateContainer within sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 18:47:11.662679 env[1192]: time="2025-03-17T18:47:11.662629212Z" level=info msg="CreateContainer within sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d\"" Mar 17 18:47:11.663042 env[1192]: time="2025-03-17T18:47:11.663013449Z" level=info msg="StartContainer for \"dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d\"" Mar 17 18:47:11.677418 systemd[1]: Started cri-containerd-dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d.scope. Mar 17 18:47:11.690000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.696687 kernel: kauditd_printk_skb: 357 callbacks suppressed Mar 17 18:47:11.696743 kernel: audit: type=1400 audit(1742237231.690:455): avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.696766 kernel: audit: type=1300 audit(1742237231.690:455): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc1354032f8 items=0 ppid=1501 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:11.690000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc1354032f8 items=0 ppid=1501 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:11.699670 kernel: audit: type=1327 audit(1742237231.690:455): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323932666630633964646261666361323530616232306566353738 Mar 17 18:47:11.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323932666630633964646261666361323530616232306566353738 Mar 17 18:47:11.706569 kernel: audit: type=1400 audit(1742237231.690:456): avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.690000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.690000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.709747 kernel: audit: type=1400 audit(1742237231.690:456): avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.715547 kernel: audit: type=1400 audit(1742237231.690:456): avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.715586 kernel: audit: type=1400 audit(1742237231.690:456): avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.690000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.690000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.690000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.690000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.720144 env[1192]: time="2025-03-17T18:47:11.720098792Z" level=info msg="StartContainer for \"dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d\" returns successfully" Mar 17 18:47:11.721834 kernel: audit: type=1400 audit(1742237231.690:456): avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.721878 kernel: audit: type=1400 audit(1742237231.690:456): avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.721893 kernel: audit: type=1400 audit(1742237231.690:456): avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.690000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.690000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.690000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.690000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.690000 audit: BPF prog-id=66 op=LOAD Mar 17 18:47:11.690000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000025248 items=0 ppid=1501 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:11.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323932666630633964646261666361323530616232306566353738 Mar 17 18:47:11.691000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.691000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.691000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.691000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.691000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.691000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.691000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.691000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.691000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.691000 audit: BPF prog-id=67 op=LOAD Mar 17 18:47:11.691000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000025298 items=0 ppid=1501 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:11.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323932666630633964646261666361323530616232306566353738 Mar 17 18:47:11.698000 audit: BPF prog-id=67 op=UNLOAD Mar 17 18:47:11.699000 audit: BPF prog-id=66 op=UNLOAD Mar 17 18:47:11.699000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.699000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.699000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.699000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.699000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.699000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.699000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.699000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.699000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.699000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:11.699000 audit: BPF prog-id=68 op=LOAD Mar 17 18:47:11.699000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000025328 items=0 ppid=1501 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:11.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323932666630633964646261666361323530616232306566353738 Mar 17 18:47:11.725321 systemd[1]: cri-containerd-dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d.scope: Deactivated successfully. Mar 17 18:47:11.731000 audit: BPF prog-id=68 op=UNLOAD Mar 17 18:47:11.817998 env[1192]: time="2025-03-17T18:47:11.817901140Z" level=info msg="shim disconnected" id=dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d Mar 17 18:47:11.817998 env[1192]: time="2025-03-17T18:47:11.817940369Z" level=warning msg="cleaning up after shim disconnected" id=dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d namespace=k8s.io Mar 17 18:47:11.817998 env[1192]: time="2025-03-17T18:47:11.817951878Z" level=info msg="cleaning up dead shim" Mar 17 18:47:11.824637 env[1192]: time="2025-03-17T18:47:11.824592052Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:47:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1621 runtime=io.containerd.runc.v2\n" Mar 17 18:47:11.935859 kubelet[1439]: E0317 18:47:11.935818 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6bp86" podUID="4f62d233-a2bf-4293-97c9-b918fbcd2fee" Mar 17 18:47:11.946868 kubelet[1439]: E0317 18:47:11.946845 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:12.481502 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d-rootfs.mount: Deactivated successfully. Mar 17 18:47:12.585053 kubelet[1439]: E0317 18:47:12.585015 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:12.712488 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount590615358.mount: Deactivated successfully. Mar 17 18:47:13.304962 env[1192]: time="2025-03-17T18:47:13.304874491Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:13.306797 env[1192]: time="2025-03-17T18:47:13.306762759Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dcfc039c372ea285997a302d60e58a75b80905b4c4dba969993b9b22e8ac66d1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:13.308370 env[1192]: time="2025-03-17T18:47:13.308325218Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:13.309701 env[1192]: time="2025-03-17T18:47:13.309656129Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:e5839270c96c3ad1bea1dce4935126d3281297527f3655408d2970aa4b5cf178,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:13.309936 env[1192]: time="2025-03-17T18:47:13.309899972Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.7\" returns image reference \"sha256:dcfc039c372ea285997a302d60e58a75b80905b4c4dba969993b9b22e8ac66d1\"" Mar 17 18:47:13.311398 env[1192]: time="2025-03-17T18:47:13.311351034Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Mar 17 18:47:13.312366 env[1192]: time="2025-03-17T18:47:13.312308638Z" level=info msg="CreateContainer within sandbox \"8f13470672ee3b0cc03f82b82366bfc7b0c8a055b8b974b8ee72525ee4828868\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Mar 17 18:47:13.326748 env[1192]: time="2025-03-17T18:47:13.326701273Z" level=info msg="CreateContainer within sandbox \"8f13470672ee3b0cc03f82b82366bfc7b0c8a055b8b974b8ee72525ee4828868\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"80388519ff1081f11872e1bcac7445f7277754c1b26c65f57ef825d5a008b1ef\"" Mar 17 18:47:13.327218 env[1192]: time="2025-03-17T18:47:13.327177656Z" level=info msg="StartContainer for \"80388519ff1081f11872e1bcac7445f7277754c1b26c65f57ef825d5a008b1ef\"" Mar 17 18:47:13.341208 systemd[1]: Started cri-containerd-80388519ff1081f11872e1bcac7445f7277754c1b26c65f57ef825d5a008b1ef.scope. Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbfc04b22c8 items=0 ppid=1515 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830333838353139666631303831663131383732653162636163373434 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit: BPF prog-id=69 op=LOAD Mar 17 18:47:13.353000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=1515 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830333838353139666631303831663131383732653162636163373434 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit: BPF prog-id=70 op=LOAD Mar 17 18:47:13.353000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=1515 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830333838353139666631303831663131383732653162636163373434 Mar 17 18:47:13.353000 audit: BPF prog-id=70 op=UNLOAD Mar 17 18:47:13.353000 audit: BPF prog-id=69 op=UNLOAD Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:13.353000 audit: BPF prog-id=71 op=LOAD Mar 17 18:47:13.353000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=1515 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830333838353139666631303831663131383732653162636163373434 Mar 17 18:47:13.369861 env[1192]: time="2025-03-17T18:47:13.369817575Z" level=info msg="StartContainer for \"80388519ff1081f11872e1bcac7445f7277754c1b26c65f57ef825d5a008b1ef\" returns successfully" Mar 17 18:47:13.454000 audit[1708]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.454000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce69f8c60 a2=0 a3=7ffce69f8c4c items=0 ppid=1657 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:47:13.454000 audit[1709]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.454000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd305dabc0 a2=0 a3=a4589f491db7661d items=0 ppid=1657 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:47:13.455000 audit[1710]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.455000 audit[1711]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.455000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9f2c6200 a2=0 a3=7fff9f2c61ec items=0 ppid=1657 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:47:13.455000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7cf14db0 a2=0 a3=7ffe7cf14d9c items=0 ppid=1657 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:47:13.456000 audit[1712]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.456000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc04a07b0 a2=0 a3=7ffcc04a079c items=0 ppid=1657 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:47:13.456000 audit[1713]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.456000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed50212f0 a2=0 a3=7ffed50212dc items=0 ppid=1657 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:47:13.555000 audit[1714]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.555000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffddae8a750 a2=0 a3=7ffddae8a73c items=0 ppid=1657 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:47:13.558000 audit[1716]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.558000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff947d4920 a2=0 a3=7fff947d490c items=0 ppid=1657 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Mar 17 18:47:13.561000 audit[1719]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.561000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff6761a500 a2=0 a3=7fff6761a4ec items=0 ppid=1657 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Mar 17 18:47:13.562000 audit[1720]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.562000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd464830f0 a2=0 a3=7ffd464830dc items=0 ppid=1657 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:47:13.564000 audit[1722]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.564000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd8ee3e6e0 a2=0 a3=7ffd8ee3e6cc items=0 ppid=1657 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:47:13.564000 audit[1723]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.564000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2f312b10 a2=0 a3=7ffc2f312afc items=0 ppid=1657 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:47:13.566000 audit[1725]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.566000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcebc33920 a2=0 a3=7ffcebc3390c items=0 ppid=1657 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:47:13.569000 audit[1728]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.569000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca87ad380 a2=0 a3=7ffca87ad36c items=0 ppid=1657 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Mar 17 18:47:13.570000 audit[1729]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.570000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8ea1d140 a2=0 a3=7fff8ea1d12c items=0 ppid=1657 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:47:13.572000 audit[1731]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.572000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc496dd790 a2=0 a3=7ffc496dd77c items=0 ppid=1657 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:47:13.572000 audit[1732]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.572000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1d19e550 a2=0 a3=7ffc1d19e53c items=0 ppid=1657 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:47:13.574000 audit[1734]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.574000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda4553680 a2=0 a3=7ffda455366c items=0 ppid=1657 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:47:13.577000 audit[1737]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.577000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff01c254d0 a2=0 a3=7fff01c254bc items=0 ppid=1657 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:47:13.579000 audit[1740]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.579000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff695e2cb0 a2=0 a3=7fff695e2c9c items=0 ppid=1657 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:47:13.580000 audit[1741]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.580000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffff4522ae0 a2=0 a3=7ffff4522acc items=0 ppid=1657 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:47:13.585307 kubelet[1439]: E0317 18:47:13.585273 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:13.582000 audit[1743]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.582000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc2062c910 a2=0 a3=7ffc2062c8fc items=0 ppid=1657 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:47:13.604000 audit[1747]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.604000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffebb599cb0 a2=0 a3=7ffebb599c9c items=0 ppid=1657 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:47:13.605000 audit[1748]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.605000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde103e0f0 a2=0 a3=7ffde103e0dc items=0 ppid=1657 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:47:13.607000 audit[1750]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:47:13.607000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd3e2ec500 a2=0 a3=7ffd3e2ec4ec items=0 ppid=1657 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:47:13.625000 audit[1756]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:13.625000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffeec4c5c80 a2=0 a3=7ffeec4c5c6c items=0 ppid=1657 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:13.640000 audit[1756]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:13.640000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffeec4c5c80 a2=0 a3=7ffeec4c5c6c items=0 ppid=1657 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:13.641000 audit[1763]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.641000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc1adebee0 a2=0 a3=7ffc1adebecc items=0 ppid=1657 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:47:13.643000 audit[1765]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.643000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffca48aed60 a2=0 a3=7ffca48aed4c items=0 ppid=1657 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Mar 17 18:47:13.646000 audit[1768]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.646000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcb6481550 a2=0 a3=7ffcb648153c items=0 ppid=1657 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.646000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Mar 17 18:47:13.647000 audit[1769]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.647000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc0dd01b0 a2=0 a3=7ffdc0dd019c items=0 ppid=1657 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:47:13.648000 audit[1771]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.648000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe31ced810 a2=0 a3=7ffe31ced7fc items=0 ppid=1657 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:47:13.649000 audit[1772]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.649000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0ef9ec50 a2=0 a3=7fff0ef9ec3c items=0 ppid=1657 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:47:13.651000 audit[1774]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.651000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf95c9800 a2=0 a3=7ffcf95c97ec items=0 ppid=1657 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Mar 17 18:47:13.653000 audit[1777]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.653000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe35987120 a2=0 a3=7ffe3598710c items=0 ppid=1657 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:47:13.654000 audit[1778]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.654000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5448f740 a2=0 a3=7ffc5448f72c items=0 ppid=1657 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:47:13.656000 audit[1780]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.656000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef5c85980 a2=0 a3=7ffef5c8596c items=0 ppid=1657 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:47:13.657000 audit[1781]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.657000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea81a3fc0 a2=0 a3=7ffea81a3fac items=0 ppid=1657 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:47:13.659000 audit[1783]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.659000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2397b7b0 a2=0 a3=7ffd2397b79c items=0 ppid=1657 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:47:13.661000 audit[1786]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.661000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef43a11a0 a2=0 a3=7ffef43a118c items=0 ppid=1657 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.661000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:47:13.664000 audit[1789]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.664000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc423d8770 a2=0 a3=7ffc423d875c items=0 ppid=1657 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Mar 17 18:47:13.665000 audit[1790]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.665000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe07d1e8f0 a2=0 a3=7ffe07d1e8dc items=0 ppid=1657 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:47:13.667000 audit[1792]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.667000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc0fb581f0 a2=0 a3=7ffc0fb581dc items=0 ppid=1657 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:47:13.669000 audit[1795]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.669000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff0dd308c0 a2=0 a3=7fff0dd308ac items=0 ppid=1657 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:47:13.670000 audit[1796]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.670000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc711d2fd0 a2=0 a3=7ffc711d2fbc items=0 ppid=1657 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:47:13.671000 audit[1798]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.671000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc1ba29230 a2=0 a3=7ffc1ba2921c items=0 ppid=1657 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:47:13.672000 audit[1799]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.672000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff824cdd10 a2=0 a3=7fff824cdcfc items=0 ppid=1657 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:47:13.674000 audit[1801]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.674000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5ba95d80 a2=0 a3=7ffd5ba95d6c items=0 ppid=1657 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:47:13.677000 audit[1804]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:47:13.677000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeb716be50 a2=0 a3=7ffeb716be3c items=0 ppid=1657 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:47:13.679000 audit[1806]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:47:13.679000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd885679f0 a2=0 a3=7ffd885679dc items=0 ppid=1657 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.679000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:13.679000 audit[1806]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:47:13.679000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd885679f0 a2=0 a3=7ffd885679dc items=0 ppid=1657 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:13.679000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:13.935716 kubelet[1439]: E0317 18:47:13.935575 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6bp86" podUID="4f62d233-a2bf-4293-97c9-b918fbcd2fee" Mar 17 18:47:13.949973 kubelet[1439]: E0317 18:47:13.949951 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:13.958127 kubelet[1439]: I0317 18:47:13.958067 1439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-xvnkv" podStartSLOduration=3.200766267 podStartE2EDuration="6.958053406s" podCreationTimestamp="2025-03-17 18:47:07 +0000 UTC" firstStartedPulling="2025-03-17 18:47:09.55385696 +0000 UTC m=+3.203126221" lastFinishedPulling="2025-03-17 18:47:13.311144099 +0000 UTC m=+6.960413360" observedRunningTime="2025-03-17 18:47:13.957777392 +0000 UTC m=+7.607046653" watchObservedRunningTime="2025-03-17 18:47:13.958053406 +0000 UTC m=+7.607322667" Mar 17 18:47:14.585750 kubelet[1439]: E0317 18:47:14.585702 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:14.951260 kubelet[1439]: E0317 18:47:14.951152 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:15.586432 kubelet[1439]: E0317 18:47:15.586390 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:15.936810 kubelet[1439]: E0317 18:47:15.936584 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6bp86" podUID="4f62d233-a2bf-4293-97c9-b918fbcd2fee" Mar 17 18:47:16.586837 kubelet[1439]: E0317 18:47:16.586802 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:17.587104 kubelet[1439]: E0317 18:47:17.587070 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:17.936623 kubelet[1439]: E0317 18:47:17.936542 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6bp86" podUID="4f62d233-a2bf-4293-97c9-b918fbcd2fee" Mar 17 18:47:18.031928 env[1192]: time="2025-03-17T18:47:18.031880831Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:18.033708 env[1192]: time="2025-03-17T18:47:18.033679418Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:18.035344 env[1192]: time="2025-03-17T18:47:18.035308866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:18.039010 env[1192]: time="2025-03-17T18:47:18.038963986Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:18.039509 env[1192]: time="2025-03-17T18:47:18.039466922Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Mar 17 18:47:18.041284 env[1192]: time="2025-03-17T18:47:18.041243376Z" level=info msg="CreateContainer within sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 18:47:18.055654 env[1192]: time="2025-03-17T18:47:18.055618700Z" level=info msg="CreateContainer within sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb\"" Mar 17 18:47:18.056102 env[1192]: time="2025-03-17T18:47:18.056068845Z" level=info msg="StartContainer for \"d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb\"" Mar 17 18:47:18.070216 systemd[1]: Started cri-containerd-d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb.scope. Mar 17 18:47:18.081000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.083210 kernel: kauditd_printk_skb: 230 callbacks suppressed Mar 17 18:47:18.083263 kernel: audit: type=1400 audit(1742237238.081:519): avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.081000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f848d761518 items=0 ppid=1501 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:18.091448 kernel: audit: type=1300 audit(1742237238.081:519): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f848d761518 items=0 ppid=1501 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:18.091498 kernel: audit: type=1327 audit(1742237238.081:519): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438343665643431663632626437616638313330623561336364333164 Mar 17 18:47:18.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438343665643431663632626437616638313330623561336364333164 Mar 17 18:47:18.081000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.098890 kernel: audit: type=1400 audit(1742237238.081:520): avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.081000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.102170 kernel: audit: type=1400 audit(1742237238.081:520): avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.102277 kernel: audit: type=1400 audit(1742237238.081:520): avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.081000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.081000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.108596 kernel: audit: type=1400 audit(1742237238.081:520): avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.108697 kernel: audit: type=1400 audit(1742237238.081:520): avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.081000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.109490 env[1192]: time="2025-03-17T18:47:18.109449129Z" level=info msg="StartContainer for \"d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb\" returns successfully" Mar 17 18:47:18.081000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.114989 kernel: audit: type=1400 audit(1742237238.081:520): avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.115041 kernel: audit: type=1400 audit(1742237238.081:520): avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.081000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.081000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.081000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.081000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.081000 audit: BPF prog-id=72 op=LOAD Mar 17 18:47:18.081000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000259bc8 items=0 ppid=1501 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:18.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438343665643431663632626437616638313330623561336364333164 Mar 17 18:47:18.085000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.085000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.085000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.085000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.085000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.085000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.085000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.085000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.085000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.085000 audit: BPF prog-id=73 op=LOAD Mar 17 18:47:18.085000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000259c18 items=0 ppid=1501 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:18.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438343665643431663632626437616638313330623561336364333164 Mar 17 18:47:18.090000 audit: BPF prog-id=73 op=UNLOAD Mar 17 18:47:18.090000 audit: BPF prog-id=72 op=UNLOAD Mar 17 18:47:18.090000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.090000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.090000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.090000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.090000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.090000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.090000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.090000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.090000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.090000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:18.090000 audit: BPF prog-id=74 op=LOAD Mar 17 18:47:18.090000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000259ca8 items=0 ppid=1501 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:18.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438343665643431663632626437616638313330623561336364333164 Mar 17 18:47:18.587962 kubelet[1439]: E0317 18:47:18.587907 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:18.957144 kubelet[1439]: E0317 18:47:18.957049 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:18.965982 systemd[1]: cri-containerd-d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb.scope: Deactivated successfully. Mar 17 18:47:18.970000 audit: BPF prog-id=74 op=UNLOAD Mar 17 18:47:18.982141 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb-rootfs.mount: Deactivated successfully. Mar 17 18:47:19.063681 kubelet[1439]: I0317 18:47:19.063636 1439 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Mar 17 18:47:19.513515 env[1192]: time="2025-03-17T18:47:19.513472955Z" level=info msg="shim disconnected" id=d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb Mar 17 18:47:19.513872 env[1192]: time="2025-03-17T18:47:19.513516684Z" level=warning msg="cleaning up after shim disconnected" id=d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb namespace=k8s.io Mar 17 18:47:19.513872 env[1192]: time="2025-03-17T18:47:19.513525548Z" level=info msg="cleaning up dead shim" Mar 17 18:47:19.519173 env[1192]: time="2025-03-17T18:47:19.519130583Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:47:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1858 runtime=io.containerd.runc.v2\n" Mar 17 18:47:19.588699 kubelet[1439]: E0317 18:47:19.588675 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:19.939438 systemd[1]: Created slice kubepods-besteffort-pod4f62d233_a2bf_4293_97c9_b918fbcd2fee.slice. Mar 17 18:47:19.941264 env[1192]: time="2025-03-17T18:47:19.941231333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6bp86,Uid:4f62d233-a2bf-4293-97c9-b918fbcd2fee,Namespace:calico-system,Attempt:0,}" Mar 17 18:47:19.959872 kubelet[1439]: E0317 18:47:19.959847 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:19.960640 env[1192]: time="2025-03-17T18:47:19.960607982Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Mar 17 18:47:19.993075 env[1192]: time="2025-03-17T18:47:19.993009907Z" level=error msg="Failed to destroy network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:19.993359 env[1192]: time="2025-03-17T18:47:19.993325844Z" level=error msg="encountered an error cleaning up failed sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:19.993395 env[1192]: time="2025-03-17T18:47:19.993371398Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6bp86,Uid:4f62d233-a2bf-4293-97c9-b918fbcd2fee,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:19.993684 kubelet[1439]: E0317 18:47:19.993603 1439 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:19.993820 kubelet[1439]: E0317 18:47:19.993699 1439 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6bp86" Mar 17 18:47:19.993820 kubelet[1439]: E0317 18:47:19.993724 1439 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6bp86" Mar 17 18:47:19.993820 kubelet[1439]: E0317 18:47:19.993769 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6bp86_calico-system(4f62d233-a2bf-4293-97c9-b918fbcd2fee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6bp86_calico-system(4f62d233-a2bf-4293-97c9-b918fbcd2fee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6bp86" podUID="4f62d233-a2bf-4293-97c9-b918fbcd2fee" Mar 17 18:47:19.994544 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270-shm.mount: Deactivated successfully. Mar 17 18:47:20.589653 kubelet[1439]: E0317 18:47:20.589614 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:20.961528 kubelet[1439]: I0317 18:47:20.961431 1439 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:47:20.961995 env[1192]: time="2025-03-17T18:47:20.961934084Z" level=info msg="StopPodSandbox for \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\"" Mar 17 18:47:20.982202 env[1192]: time="2025-03-17T18:47:20.982152107Z" level=error msg="StopPodSandbox for \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\" failed" error="failed to destroy network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:20.982364 kubelet[1439]: E0317 18:47:20.982323 1439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:47:20.982418 kubelet[1439]: E0317 18:47:20.982369 1439 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270"} Mar 17 18:47:20.982444 kubelet[1439]: E0317 18:47:20.982414 1439 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4f62d233-a2bf-4293-97c9-b918fbcd2fee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:47:20.982444 kubelet[1439]: E0317 18:47:20.982434 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4f62d233-a2bf-4293-97c9-b918fbcd2fee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6bp86" podUID="4f62d233-a2bf-4293-97c9-b918fbcd2fee" Mar 17 18:47:21.590302 kubelet[1439]: E0317 18:47:21.590266 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:22.591423 kubelet[1439]: E0317 18:47:22.591383 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:23.200219 systemd[1]: Created slice kubepods-besteffort-pod4f14c568_2007_42d6_8fab_a40ed1dd8ab3.slice. Mar 17 18:47:23.294292 kubelet[1439]: I0317 18:47:23.294262 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tq5fh\" (UniqueName: \"kubernetes.io/projected/4f14c568-2007-42d6-8fab-a40ed1dd8ab3-kube-api-access-tq5fh\") pod \"nginx-deployment-8587fbcb89-5n94x\" (UID: \"4f14c568-2007-42d6-8fab-a40ed1dd8ab3\") " pod="default/nginx-deployment-8587fbcb89-5n94x" Mar 17 18:47:23.503382 env[1192]: time="2025-03-17T18:47:23.503076489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-5n94x,Uid:4f14c568-2007-42d6-8fab-a40ed1dd8ab3,Namespace:default,Attempt:0,}" Mar 17 18:47:23.562381 env[1192]: time="2025-03-17T18:47:23.562323622Z" level=error msg="Failed to destroy network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:23.563867 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304-shm.mount: Deactivated successfully. Mar 17 18:47:23.564673 env[1192]: time="2025-03-17T18:47:23.564621352Z" level=error msg="encountered an error cleaning up failed sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:23.564732 env[1192]: time="2025-03-17T18:47:23.564686917Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-5n94x,Uid:4f14c568-2007-42d6-8fab-a40ed1dd8ab3,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:23.564970 kubelet[1439]: E0317 18:47:23.564913 1439 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:23.565108 kubelet[1439]: E0317 18:47:23.564983 1439 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-5n94x" Mar 17 18:47:23.565108 kubelet[1439]: E0317 18:47:23.565004 1439 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-5n94x" Mar 17 18:47:23.565108 kubelet[1439]: E0317 18:47:23.565048 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-5n94x_default(4f14c568-2007-42d6-8fab-a40ed1dd8ab3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-5n94x_default(4f14c568-2007-42d6-8fab-a40ed1dd8ab3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-5n94x" podUID="4f14c568-2007-42d6-8fab-a40ed1dd8ab3" Mar 17 18:47:23.591895 kubelet[1439]: E0317 18:47:23.591868 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:23.965379 kubelet[1439]: I0317 18:47:23.965287 1439 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:47:23.965959 env[1192]: time="2025-03-17T18:47:23.965922068Z" level=info msg="StopPodSandbox for \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\"" Mar 17 18:47:23.986461 env[1192]: time="2025-03-17T18:47:23.986406384Z" level=error msg="StopPodSandbox for \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\" failed" error="failed to destroy network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:23.986620 kubelet[1439]: E0317 18:47:23.986589 1439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:47:23.986697 kubelet[1439]: E0317 18:47:23.986636 1439 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304"} Mar 17 18:47:23.986697 kubelet[1439]: E0317 18:47:23.986674 1439 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4f14c568-2007-42d6-8fab-a40ed1dd8ab3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:47:23.986785 kubelet[1439]: E0317 18:47:23.986692 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4f14c568-2007-42d6-8fab-a40ed1dd8ab3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-5n94x" podUID="4f14c568-2007-42d6-8fab-a40ed1dd8ab3" Mar 17 18:47:24.592571 kubelet[1439]: E0317 18:47:24.592520 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:25.592920 kubelet[1439]: E0317 18:47:25.592849 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:26.210306 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3907398414.mount: Deactivated successfully. Mar 17 18:47:26.583139 kubelet[1439]: E0317 18:47:26.583013 1439 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:26.593524 kubelet[1439]: E0317 18:47:26.593469 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:27.419746 env[1192]: time="2025-03-17T18:47:27.419688338Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:27.421964 env[1192]: time="2025-03-17T18:47:27.421914570Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:27.423344 env[1192]: time="2025-03-17T18:47:27.423314980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:27.424671 env[1192]: time="2025-03-17T18:47:27.424631174Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:27.425010 env[1192]: time="2025-03-17T18:47:27.424981668Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Mar 17 18:47:27.433100 env[1192]: time="2025-03-17T18:47:27.433062918Z" level=info msg="CreateContainer within sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 18:47:27.447816 env[1192]: time="2025-03-17T18:47:27.447777404Z" level=info msg="CreateContainer within sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d\"" Mar 17 18:47:27.448204 env[1192]: time="2025-03-17T18:47:27.448164668Z" level=info msg="StartContainer for \"8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d\"" Mar 17 18:47:27.463611 systemd[1]: Started cri-containerd-8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d.scope. Mar 17 18:47:27.474000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.475962 kernel: kauditd_printk_skb: 34 callbacks suppressed Mar 17 18:47:27.476013 kernel: audit: type=1400 audit(1742237247.474:526): avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.474000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f86c27bc198 items=0 ppid=1501 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:27.483328 kernel: audit: type=1300 audit(1742237247.474:526): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f86c27bc198 items=0 ppid=1501 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:27.483372 kernel: audit: type=1327 audit(1742237247.474:526): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353431343062303963386431643136633663363666333232376265 Mar 17 18:47:27.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353431343062303963386431643136633663363666333232376265 Mar 17 18:47:27.474000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.490131 kernel: audit: type=1400 audit(1742237247.474:527): avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.490185 kernel: audit: type=1400 audit(1742237247.474:527): avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.474000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.493166 kernel: audit: type=1400 audit(1742237247.474:527): avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.474000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.495846 kernel: audit: type=1400 audit(1742237247.474:527): avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.474000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.474000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.501882 kernel: audit: type=1400 audit(1742237247.474:527): avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.502005 kernel: audit: type=1400 audit(1742237247.474:527): avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.474000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.503723 env[1192]: time="2025-03-17T18:47:27.503575444Z" level=info msg="StartContainer for \"8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d\" returns successfully" Mar 17 18:47:27.504741 kernel: audit: type=1400 audit(1742237247.474:527): avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.474000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.474000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.474000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.474000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.474000 audit: BPF prog-id=75 op=LOAD Mar 17 18:47:27.474000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000245c88 items=0 ppid=1501 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:27.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353431343062303963386431643136633663363666333232376265 Mar 17 18:47:27.478000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.478000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.478000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.478000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.478000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.478000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.478000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.478000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.478000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.478000 audit: BPF prog-id=76 op=LOAD Mar 17 18:47:27.478000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000245cd8 items=0 ppid=1501 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:27.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353431343062303963386431643136633663363666333232376265 Mar 17 18:47:27.482000 audit: BPF prog-id=76 op=UNLOAD Mar 17 18:47:27.482000 audit: BPF prog-id=75 op=UNLOAD Mar 17 18:47:27.482000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.482000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.482000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.482000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.482000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.482000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.482000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.482000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.482000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.482000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:27.482000 audit: BPF prog-id=77 op=LOAD Mar 17 18:47:27.482000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000245d68 items=0 ppid=1501 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:27.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835353431343062303963386431643136633663363666333232376265 Mar 17 18:47:27.565706 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Mar 17 18:47:27.565766 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Mar 17 18:47:27.583142 systemd[1]: cri-containerd-8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d.scope: Deactivated successfully. Mar 17 18:47:27.587000 audit: BPF prog-id=77 op=UNLOAD Mar 17 18:47:27.594132 kubelet[1439]: E0317 18:47:27.594097 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:27.908647 env[1192]: time="2025-03-17T18:47:27.908491486Z" level=info msg="shim disconnected" id=8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d Mar 17 18:47:27.908647 env[1192]: time="2025-03-17T18:47:27.908545385Z" level=warning msg="cleaning up after shim disconnected" id=8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d namespace=k8s.io Mar 17 18:47:27.908647 env[1192]: time="2025-03-17T18:47:27.908554035Z" level=info msg="cleaning up dead shim" Mar 17 18:47:27.914708 env[1192]: time="2025-03-17T18:47:27.914680171Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:47:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2053 runtime=io.containerd.runc.v2\n" Mar 17 18:47:27.972254 kubelet[1439]: I0317 18:47:27.972233 1439 scope.go:117] "RemoveContainer" containerID="8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d" Mar 17 18:47:27.972496 kubelet[1439]: E0317 18:47:27.972478 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:27.976961 env[1192]: time="2025-03-17T18:47:27.976905182Z" level=info msg="CreateContainer within sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" Mar 17 18:47:27.990727 env[1192]: time="2025-03-17T18:47:27.990686208Z" level=info msg="CreateContainer within sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a\"" Mar 17 18:47:27.991095 env[1192]: time="2025-03-17T18:47:27.991075677Z" level=info msg="StartContainer for \"57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a\"" Mar 17 18:47:28.004162 systemd[1]: Started cri-containerd-57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a.scope. Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa93dd787b8 items=0 ppid=1501 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:28.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633230623765343665396236366261353066383136326637643534 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit: BPF prog-id=78 op=LOAD Mar 17 18:47:28.015000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027c1d8 items=0 ppid=1501 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:28.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633230623765343665396236366261353066383136326637643534 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit: BPF prog-id=79 op=LOAD Mar 17 18:47:28.015000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027c228 items=0 ppid=1501 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:28.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633230623765343665396236366261353066383136326637643534 Mar 17 18:47:28.015000 audit: BPF prog-id=79 op=UNLOAD Mar 17 18:47:28.015000 audit: BPF prog-id=78 op=UNLOAD Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:28.015000 audit: BPF prog-id=80 op=LOAD Mar 17 18:47:28.015000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027c2b8 items=0 ppid=1501 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:28.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633230623765343665396236366261353066383136326637643534 Mar 17 18:47:28.026605 env[1192]: time="2025-03-17T18:47:28.026573944Z" level=info msg="StartContainer for \"57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a\" returns successfully" Mar 17 18:47:28.067555 systemd[1]: cri-containerd-57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a.scope: Deactivated successfully. Mar 17 18:47:28.072000 audit: BPF prog-id=80 op=UNLOAD Mar 17 18:47:28.090637 env[1192]: time="2025-03-17T18:47:28.090596954Z" level=info msg="shim disconnected" id=57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a Mar 17 18:47:28.090786 env[1192]: time="2025-03-17T18:47:28.090637653Z" level=warning msg="cleaning up after shim disconnected" id=57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a namespace=k8s.io Mar 17 18:47:28.090786 env[1192]: time="2025-03-17T18:47:28.090647264Z" level=info msg="cleaning up dead shim" Mar 17 18:47:28.096191 env[1192]: time="2025-03-17T18:47:28.096160467Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:47:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2115 runtime=io.containerd.runc.v2\n" Mar 17 18:47:28.430050 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d-rootfs.mount: Deactivated successfully. Mar 17 18:47:28.594537 kubelet[1439]: E0317 18:47:28.594497 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:28.975258 kubelet[1439]: I0317 18:47:28.975241 1439 scope.go:117] "RemoveContainer" containerID="8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d" Mar 17 18:47:28.975490 kubelet[1439]: I0317 18:47:28.975475 1439 scope.go:117] "RemoveContainer" containerID="57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a" Mar 17 18:47:28.975536 kubelet[1439]: E0317 18:47:28.975526 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:28.975609 kubelet[1439]: E0317 18:47:28.975591 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-dqqt5_calico-system(67590e04-876b-4571-9e09-d4cf893b7db1)\"" pod="calico-system/calico-node-dqqt5" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" Mar 17 18:47:28.976434 env[1192]: time="2025-03-17T18:47:28.976396958Z" level=info msg="RemoveContainer for \"8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d\"" Mar 17 18:47:28.981915 env[1192]: time="2025-03-17T18:47:28.981882139Z" level=info msg="RemoveContainer for \"8554140b09c8d1d16c6c66f3227be6daff66c42fe27a512e9668e92ffa9b445d\" returns successfully" Mar 17 18:47:29.594616 kubelet[1439]: E0317 18:47:29.594587 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:29.978246 kubelet[1439]: I0317 18:47:29.978187 1439 scope.go:117] "RemoveContainer" containerID="57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a" Mar 17 18:47:29.978296 kubelet[1439]: E0317 18:47:29.978248 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:29.978362 kubelet[1439]: E0317 18:47:29.978333 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-dqqt5_calico-system(67590e04-876b-4571-9e09-d4cf893b7db1)\"" pod="calico-system/calico-node-dqqt5" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" Mar 17 18:47:30.595019 kubelet[1439]: E0317 18:47:30.594972 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:31.595453 kubelet[1439]: E0317 18:47:31.595422 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:31.936235 env[1192]: time="2025-03-17T18:47:31.936146861Z" level=info msg="StopPodSandbox for \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\"" Mar 17 18:47:31.957711 env[1192]: time="2025-03-17T18:47:31.957639403Z" level=error msg="StopPodSandbox for \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\" failed" error="failed to destroy network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:31.957891 kubelet[1439]: E0317 18:47:31.957848 1439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:47:31.957935 kubelet[1439]: E0317 18:47:31.957893 1439 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270"} Mar 17 18:47:31.957935 kubelet[1439]: E0317 18:47:31.957923 1439 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4f62d233-a2bf-4293-97c9-b918fbcd2fee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:47:31.958024 kubelet[1439]: E0317 18:47:31.957944 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4f62d233-a2bf-4293-97c9-b918fbcd2fee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6bp86" podUID="4f62d233-a2bf-4293-97c9-b918fbcd2fee" Mar 17 18:47:32.126071 kubelet[1439]: I0317 18:47:32.126045 1439 scope.go:117] "RemoveContainer" containerID="57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a" Mar 17 18:47:32.126123 kubelet[1439]: E0317 18:47:32.126097 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:32.126172 kubelet[1439]: E0317 18:47:32.126154 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-dqqt5_calico-system(67590e04-876b-4571-9e09-d4cf893b7db1)\"" pod="calico-system/calico-node-dqqt5" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" Mar 17 18:47:32.596110 kubelet[1439]: E0317 18:47:32.596081 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:33.596601 kubelet[1439]: E0317 18:47:33.596569 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:34.597379 kubelet[1439]: E0317 18:47:34.597353 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:35.597750 kubelet[1439]: E0317 18:47:35.597721 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:35.936866 env[1192]: time="2025-03-17T18:47:35.936752665Z" level=info msg="StopPodSandbox for \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\"" Mar 17 18:47:35.957993 env[1192]: time="2025-03-17T18:47:35.957933305Z" level=error msg="StopPodSandbox for \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\" failed" error="failed to destroy network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:35.958180 kubelet[1439]: E0317 18:47:35.958135 1439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:47:35.958242 kubelet[1439]: E0317 18:47:35.958192 1439 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304"} Mar 17 18:47:35.958242 kubelet[1439]: E0317 18:47:35.958226 1439 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4f14c568-2007-42d6-8fab-a40ed1dd8ab3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:47:35.958328 kubelet[1439]: E0317 18:47:35.958247 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4f14c568-2007-42d6-8fab-a40ed1dd8ab3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-5n94x" podUID="4f14c568-2007-42d6-8fab-a40ed1dd8ab3" Mar 17 18:47:36.597838 kubelet[1439]: E0317 18:47:36.597809 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:36.749258 kubelet[1439]: I0317 18:47:36.749231 1439 scope.go:117] "RemoveContainer" containerID="57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a" Mar 17 18:47:36.749311 kubelet[1439]: E0317 18:47:36.749287 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:36.749390 kubelet[1439]: E0317 18:47:36.749353 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-dqqt5_calico-system(67590e04-876b-4571-9e09-d4cf893b7db1)\"" pod="calico-system/calico-node-dqqt5" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" Mar 17 18:47:37.598319 kubelet[1439]: E0317 18:47:37.598259 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:38.599309 kubelet[1439]: E0317 18:47:38.599281 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:39.599736 kubelet[1439]: E0317 18:47:39.599704 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:40.103488 update_engine[1188]: I0317 18:47:40.103448 1188 update_attempter.cc:509] Updating boot flags... Mar 17 18:47:40.600130 kubelet[1439]: E0317 18:47:40.600096 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:41.600639 kubelet[1439]: E0317 18:47:41.600611 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:42.601290 kubelet[1439]: E0317 18:47:42.601242 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:43.601578 kubelet[1439]: E0317 18:47:43.601510 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:44.602556 kubelet[1439]: E0317 18:47:44.602507 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:44.936590 env[1192]: time="2025-03-17T18:47:44.936560738Z" level=info msg="StopPodSandbox for \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\"" Mar 17 18:47:44.957731 env[1192]: time="2025-03-17T18:47:44.957656037Z" level=error msg="StopPodSandbox for \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\" failed" error="failed to destroy network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:44.957872 kubelet[1439]: E0317 18:47:44.957840 1439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:47:44.957912 kubelet[1439]: E0317 18:47:44.957883 1439 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270"} Mar 17 18:47:44.957936 kubelet[1439]: E0317 18:47:44.957916 1439 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4f62d233-a2bf-4293-97c9-b918fbcd2fee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:47:44.958000 kubelet[1439]: E0317 18:47:44.957938 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4f62d233-a2bf-4293-97c9-b918fbcd2fee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6bp86" podUID="4f62d233-a2bf-4293-97c9-b918fbcd2fee" Mar 17 18:47:45.603122 kubelet[1439]: E0317 18:47:45.603098 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:46.582603 kubelet[1439]: E0317 18:47:46.582577 1439 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:46.603323 kubelet[1439]: E0317 18:47:46.603289 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:46.936920 kubelet[1439]: I0317 18:47:46.936833 1439 scope.go:117] "RemoveContainer" containerID="57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a" Mar 17 18:47:46.936920 kubelet[1439]: E0317 18:47:46.936898 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:46.937024 env[1192]: time="2025-03-17T18:47:46.936834480Z" level=info msg="StopPodSandbox for \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\"" Mar 17 18:47:46.938378 env[1192]: time="2025-03-17T18:47:46.938344397Z" level=info msg="CreateContainer within sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" Mar 17 18:47:46.951221 env[1192]: time="2025-03-17T18:47:46.951171272Z" level=info msg="CreateContainer within sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8\"" Mar 17 18:47:46.951645 env[1192]: time="2025-03-17T18:47:46.951602414Z" level=info msg="StartContainer for \"ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8\"" Mar 17 18:47:46.959200 env[1192]: time="2025-03-17T18:47:46.959151039Z" level=error msg="StopPodSandbox for \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\" failed" error="failed to destroy network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:47:46.959554 kubelet[1439]: E0317 18:47:46.959508 1439 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:47:46.959622 kubelet[1439]: E0317 18:47:46.959583 1439 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304"} Mar 17 18:47:46.959651 kubelet[1439]: E0317 18:47:46.959619 1439 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4f14c568-2007-42d6-8fab-a40ed1dd8ab3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:47:46.959732 kubelet[1439]: E0317 18:47:46.959651 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4f14c568-2007-42d6-8fab-a40ed1dd8ab3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-5n94x" podUID="4f14c568-2007-42d6-8fab-a40ed1dd8ab3" Mar 17 18:47:46.968299 systemd[1]: Started cri-containerd-ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8.scope. Mar 17 18:47:46.978000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.980352 kernel: kauditd_printk_skb: 78 callbacks suppressed Mar 17 18:47:46.980397 kernel: audit: type=1400 audit(1742237266.978:540): avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.978000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd6f9420768 items=0 ppid=1501 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:46.987865 kernel: audit: type=1300 audit(1742237266.978:540): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd6f9420768 items=0 ppid=1501 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:46.987920 kernel: audit: type=1327 audit(1742237266.978:540): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666313835396537653238316462306334643334313238323239336164 Mar 17 18:47:46.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666313835396537653238316462306334643334313238323239336164 Mar 17 18:47:46.991829 kernel: audit: type=1400 audit(1742237266.978:541): avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.978000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.994671 kernel: audit: type=1400 audit(1742237266.978:541): avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.978000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.978000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:47.000315 kernel: audit: type=1400 audit(1742237266.978:541): avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.978000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:47.003366 kernel: audit: type=1400 audit(1742237266.978:541): avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:47.003417 kernel: audit: type=1400 audit(1742237266.978:541): avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.978000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.978000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:47.010285 env[1192]: time="2025-03-17T18:47:47.009444473Z" level=info msg="StartContainer for \"ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8\" returns successfully" Mar 17 18:47:46.978000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:47.013691 kernel: audit: type=1400 audit(1742237266.978:541): avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:47.013761 kernel: audit: type=1400 audit(1742237266.978:541): avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.978000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.978000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.978000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.978000 audit: BPF prog-id=81 op=LOAD Mar 17 18:47:46.978000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000359eb8 items=0 ppid=1501 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:46.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666313835396537653238316462306334643334313238323239336164 Mar 17 18:47:46.982000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.982000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.982000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.982000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.982000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.982000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.982000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.982000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.982000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.982000 audit: BPF prog-id=82 op=LOAD Mar 17 18:47:46.982000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000359f08 items=0 ppid=1501 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:46.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666313835396537653238316462306334643334313238323239336164 Mar 17 18:47:46.987000 audit: BPF prog-id=82 op=UNLOAD Mar 17 18:47:46.987000 audit: BPF prog-id=81 op=UNLOAD Mar 17 18:47:46.987000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.987000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.987000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.987000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.987000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.987000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.987000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.987000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.987000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.987000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:46.987000 audit: BPF prog-id=83 op=LOAD Mar 17 18:47:46.987000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000359f98 items=0 ppid=1501 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:46.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666313835396537653238316462306334643334313238323239336164 Mar 17 18:47:47.050832 systemd[1]: cri-containerd-ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8.scope: Deactivated successfully. Mar 17 18:47:47.054000 audit: BPF prog-id=83 op=UNLOAD Mar 17 18:47:47.065712 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8-rootfs.mount: Deactivated successfully. Mar 17 18:47:47.073965 env[1192]: time="2025-03-17T18:47:47.073922544Z" level=info msg="shim disconnected" id=ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8 Mar 17 18:47:47.074063 env[1192]: time="2025-03-17T18:47:47.073965349Z" level=warning msg="cleaning up after shim disconnected" id=ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8 namespace=k8s.io Mar 17 18:47:47.074063 env[1192]: time="2025-03-17T18:47:47.073974968Z" level=info msg="cleaning up dead shim" Mar 17 18:47:47.079366 env[1192]: time="2025-03-17T18:47:47.079324160Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:47:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2292 runtime=io.containerd.runc.v2\n" Mar 17 18:47:47.603565 kubelet[1439]: E0317 18:47:47.603530 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:48.007140 kubelet[1439]: I0317 18:47:48.007121 1439 scope.go:117] "RemoveContainer" containerID="57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a" Mar 17 18:47:48.007391 kubelet[1439]: I0317 18:47:48.007368 1439 scope.go:117] "RemoveContainer" containerID="ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8" Mar 17 18:47:48.007491 kubelet[1439]: E0317 18:47:48.007460 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:48.007555 kubelet[1439]: E0317 18:47:48.007538 1439 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-dqqt5_calico-system(67590e04-876b-4571-9e09-d4cf893b7db1)\"" pod="calico-system/calico-node-dqqt5" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" Mar 17 18:47:48.008045 env[1192]: time="2025-03-17T18:47:48.008011600Z" level=info msg="RemoveContainer for \"57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a\"" Mar 17 18:47:48.010538 env[1192]: time="2025-03-17T18:47:48.010514276Z" level=info msg="RemoveContainer for \"57c20b7e46e9b66ba50f8162f7d54e0a519a55e177e01d4ec0ce65bd342d847a\" returns successfully" Mar 17 18:47:48.604098 kubelet[1439]: E0317 18:47:48.604067 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:49.605190 kubelet[1439]: E0317 18:47:49.605146 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:50.542528 systemd[1]: Created slice kubepods-besteffort-pod38fd45b4_7cae_485d_a7d4_566bdfe08587.slice. Mar 17 18:47:50.556000 audit[2305]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:50.556000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff9960efe0 a2=0 a3=7fff9960efcc items=0 ppid=1657 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:50.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:50.560000 audit[2305]: NETFILTER_CFG table=nat:66 family=2 entries=22 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:50.560000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff9960efe0 a2=0 a3=7fff9960efcc items=0 ppid=1657 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:50.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:50.606223 kubelet[1439]: E0317 18:47:50.606158 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:50.628575 kubelet[1439]: I0317 18:47:50.628538 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r28xj\" (UniqueName: \"kubernetes.io/projected/38fd45b4-7cae-485d-a7d4-566bdfe08587-kube-api-access-r28xj\") pod \"calico-typha-6dc7b4695c-4jbmw\" (UID: \"38fd45b4-7cae-485d-a7d4-566bdfe08587\") " pod="calico-system/calico-typha-6dc7b4695c-4jbmw" Mar 17 18:47:50.628575 kubelet[1439]: I0317 18:47:50.628571 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/38fd45b4-7cae-485d-a7d4-566bdfe08587-typha-certs\") pod \"calico-typha-6dc7b4695c-4jbmw\" (UID: \"38fd45b4-7cae-485d-a7d4-566bdfe08587\") " pod="calico-system/calico-typha-6dc7b4695c-4jbmw" Mar 17 18:47:50.628575 kubelet[1439]: I0317 18:47:50.628588 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/38fd45b4-7cae-485d-a7d4-566bdfe08587-tigera-ca-bundle\") pod \"calico-typha-6dc7b4695c-4jbmw\" (UID: \"38fd45b4-7cae-485d-a7d4-566bdfe08587\") " pod="calico-system/calico-typha-6dc7b4695c-4jbmw" Mar 17 18:47:50.635029 env[1192]: time="2025-03-17T18:47:50.634970235Z" level=info msg="StopPodSandbox for \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\"" Mar 17 18:47:50.635029 env[1192]: time="2025-03-17T18:47:50.635029353Z" level=info msg="Container to stop \"dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Mar 17 18:47:50.635342 env[1192]: time="2025-03-17T18:47:50.635042088Z" level=info msg="Container to stop \"d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Mar 17 18:47:50.635342 env[1192]: time="2025-03-17T18:47:50.635052228Z" level=info msg="Container to stop \"ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Mar 17 18:47:50.636537 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8-shm.mount: Deactivated successfully. Mar 17 18:47:50.639933 systemd[1]: cri-containerd-6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8.scope: Deactivated successfully. Mar 17 18:47:50.639000 audit: BPF prog-id=58 op=UNLOAD Mar 17 18:47:50.643000 audit: BPF prog-id=61 op=UNLOAD Mar 17 18:47:50.657005 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8-rootfs.mount: Deactivated successfully. Mar 17 18:47:50.662977 env[1192]: time="2025-03-17T18:47:50.662915585Z" level=info msg="shim disconnected" id=6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8 Mar 17 18:47:50.662977 env[1192]: time="2025-03-17T18:47:50.662967879Z" level=warning msg="cleaning up after shim disconnected" id=6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8 namespace=k8s.io Mar 17 18:47:50.662977 env[1192]: time="2025-03-17T18:47:50.662977147Z" level=info msg="cleaning up dead shim" Mar 17 18:47:50.668945 env[1192]: time="2025-03-17T18:47:50.668912292Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:47:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2324 runtime=io.containerd.runc.v2\n" Mar 17 18:47:50.669459 env[1192]: time="2025-03-17T18:47:50.669173078Z" level=info msg="TearDown network for sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" successfully" Mar 17 18:47:50.669459 env[1192]: time="2025-03-17T18:47:50.669250952Z" level=info msg="StopPodSandbox for \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" returns successfully" Mar 17 18:47:50.672000 audit[2337]: NETFILTER_CFG table=filter:67 family=2 entries=17 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:50.672000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd373c2f40 a2=0 a3=7ffd373c2f2c items=0 ppid=1657 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:50.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:50.677000 audit[2337]: NETFILTER_CFG table=nat:68 family=2 entries=19 op=nft_unregister_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:50.677000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=2956 a0=3 a1=7ffd373c2f40 a2=0 a3=0 items=0 ppid=1657 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:50.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:50.695587 kubelet[1439]: E0317 18:47:50.695562 1439 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" containerName="install-cni" Mar 17 18:47:50.695587 kubelet[1439]: E0317 18:47:50.695582 1439 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" containerName="calico-node" Mar 17 18:47:50.695587 kubelet[1439]: E0317 18:47:50.695587 1439 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" containerName="calico-node" Mar 17 18:47:50.695587 kubelet[1439]: E0317 18:47:50.695592 1439 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" containerName="flexvol-driver" Mar 17 18:47:50.695805 kubelet[1439]: I0317 18:47:50.695610 1439 memory_manager.go:354] "RemoveStaleState removing state" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" containerName="calico-node" Mar 17 18:47:50.695805 kubelet[1439]: I0317 18:47:50.695616 1439 memory_manager.go:354] "RemoveStaleState removing state" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" containerName="calico-node" Mar 17 18:47:50.695805 kubelet[1439]: E0317 18:47:50.695629 1439 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" containerName="calico-node" Mar 17 18:47:50.695805 kubelet[1439]: I0317 18:47:50.695640 1439 memory_manager.go:354] "RemoveStaleState removing state" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" containerName="calico-node" Mar 17 18:47:50.699229 systemd[1]: Created slice kubepods-besteffort-podeb3bbdf1_ee8f_4ee7_b8e0_f8d559ac5409.slice. Mar 17 18:47:50.729156 kubelet[1439]: I0317 18:47:50.729118 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-net-dir\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729156 kubelet[1439]: I0317 18:47:50.729159 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-log-dir\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729283 kubelet[1439]: I0317 18:47:50.729173 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-var-run-calico\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729283 kubelet[1439]: I0317 18:47:50.729199 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-xtables-lock\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729283 kubelet[1439]: I0317 18:47:50.729216 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:47:50.729283 kubelet[1439]: I0317 18:47:50.729223 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-jnw58\" (UniqueName: \"kubernetes.io/projected/67590e04-876b-4571-9e09-d4cf893b7db1-kube-api-access-jnw58\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729283 kubelet[1439]: I0317 18:47:50.729239 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:47:50.729404 kubelet[1439]: I0317 18:47:50.729274 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:47:50.729404 kubelet[1439]: I0317 18:47:50.729274 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-var-lib-calico\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729404 kubelet[1439]: I0317 18:47:50.729292 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:47:50.729404 kubelet[1439]: I0317 18:47:50.729296 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-flexvol-driver-host\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729404 kubelet[1439]: I0317 18:47:50.729310 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:47:50.729518 kubelet[1439]: I0317 18:47:50.729313 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-policysync\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729518 kubelet[1439]: I0317 18:47:50.729325 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:47:50.729518 kubelet[1439]: I0317 18:47:50.729332 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/67590e04-876b-4571-9e09-d4cf893b7db1-node-certs\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729518 kubelet[1439]: I0317 18:47:50.729341 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-policysync" (OuterVolumeSpecName: "policysync") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:47:50.729518 kubelet[1439]: I0317 18:47:50.729349 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/67590e04-876b-4571-9e09-d4cf893b7db1-tigera-ca-bundle\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729518 kubelet[1439]: I0317 18:47:50.729366 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-lib-modules\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729648 kubelet[1439]: I0317 18:47:50.729378 1439 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-bin-dir\") pod \"67590e04-876b-4571-9e09-d4cf893b7db1\" (UID: \"67590e04-876b-4571-9e09-d4cf893b7db1\") " Mar 17 18:47:50.729648 kubelet[1439]: I0317 18:47:50.729414 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-policysync\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729648 kubelet[1439]: I0317 18:47:50.729432 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-node-certs\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729648 kubelet[1439]: I0317 18:47:50.729447 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-xtables-lock\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729648 kubelet[1439]: I0317 18:47:50.729461 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-var-run-calico\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729782 kubelet[1439]: I0317 18:47:50.729477 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-flexvol-driver-host\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729782 kubelet[1439]: I0317 18:47:50.729492 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-shr5b\" (UniqueName: \"kubernetes.io/projected/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-kube-api-access-shr5b\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729782 kubelet[1439]: I0317 18:47:50.729505 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-lib-modules\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729782 kubelet[1439]: I0317 18:47:50.729519 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-var-lib-calico\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729782 kubelet[1439]: I0317 18:47:50.729535 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-cni-log-dir\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729897 kubelet[1439]: I0317 18:47:50.729558 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-cni-bin-dir\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729897 kubelet[1439]: I0317 18:47:50.729578 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-cni-net-dir\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729897 kubelet[1439]: I0317 18:47:50.729594 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409-tigera-ca-bundle\") pod \"calico-node-js9tm\" (UID: \"eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409\") " pod="calico-system/calico-node-js9tm" Mar 17 18:47:50.729897 kubelet[1439]: I0317 18:47:50.729610 1439 reconciler_common.go:288] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-policysync\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.729897 kubelet[1439]: I0317 18:47:50.729619 1439 reconciler_common.go:288] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-var-run-calico\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.729897 kubelet[1439]: I0317 18:47:50.729628 1439 reconciler_common.go:288] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-xtables-lock\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.729897 kubelet[1439]: I0317 18:47:50.729636 1439 reconciler_common.go:288] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-net-dir\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.730052 kubelet[1439]: I0317 18:47:50.729643 1439 reconciler_common.go:288] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-log-dir\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.730052 kubelet[1439]: I0317 18:47:50.729651 1439 reconciler_common.go:288] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-var-lib-calico\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.730052 kubelet[1439]: I0317 18:47:50.729682 1439 reconciler_common.go:288] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-flexvol-driver-host\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.731013 kubelet[1439]: I0317 18:47:50.730180 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:47:50.731013 kubelet[1439]: I0317 18:47:50.730223 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Mar 17 18:47:50.732060 kubelet[1439]: I0317 18:47:50.732021 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/67590e04-876b-4571-9e09-d4cf893b7db1-kube-api-access-jnw58" (OuterVolumeSpecName: "kube-api-access-jnw58") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "kube-api-access-jnw58". PluginName "kubernetes.io/projected", VolumeGidValue "" Mar 17 18:47:50.733001 systemd[1]: var-lib-kubelet-pods-67590e04\x2d876b\x2d4571\x2d9e09\x2dd4cf893b7db1-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2djnw58.mount: Deactivated successfully. Mar 17 18:47:50.733090 systemd[1]: var-lib-kubelet-pods-67590e04\x2d876b\x2d4571\x2d9e09\x2dd4cf893b7db1-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Mar 17 18:47:50.733607 kubelet[1439]: I0317 18:47:50.733582 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/67590e04-876b-4571-9e09-d4cf893b7db1-node-certs" (OuterVolumeSpecName: "node-certs") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Mar 17 18:47:50.735009 kubelet[1439]: I0317 18:47:50.734983 1439 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/67590e04-876b-4571-9e09-d4cf893b7db1-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "67590e04-876b-4571-9e09-d4cf893b7db1" (UID: "67590e04-876b-4571-9e09-d4cf893b7db1"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Mar 17 18:47:50.735517 systemd[1]: var-lib-kubelet-pods-67590e04\x2d876b\x2d4571\x2d9e09\x2dd4cf893b7db1-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Mar 17 18:47:50.831935 kubelet[1439]: I0317 18:47:50.830414 1439 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-jnw58\" (UniqueName: \"kubernetes.io/projected/67590e04-876b-4571-9e09-d4cf893b7db1-kube-api-access-jnw58\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.831935 kubelet[1439]: I0317 18:47:50.830439 1439 reconciler_common.go:288] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-cni-bin-dir\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.831935 kubelet[1439]: I0317 18:47:50.830448 1439 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/67590e04-876b-4571-9e09-d4cf893b7db1-tigera-ca-bundle\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.831935 kubelet[1439]: I0317 18:47:50.830456 1439 reconciler_common.go:288] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/67590e04-876b-4571-9e09-d4cf893b7db1-lib-modules\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.831935 kubelet[1439]: I0317 18:47:50.830463 1439 reconciler_common.go:288] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/67590e04-876b-4571-9e09-d4cf893b7db1-node-certs\") on node \"10.0.0.143\" DevicePath \"\"" Mar 17 18:47:50.845292 kubelet[1439]: E0317 18:47:50.845259 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:50.845771 env[1192]: time="2025-03-17T18:47:50.845730958Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6dc7b4695c-4jbmw,Uid:38fd45b4-7cae-485d-a7d4-566bdfe08587,Namespace:calico-system,Attempt:0,}" Mar 17 18:47:50.860277 env[1192]: time="2025-03-17T18:47:50.860205380Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:47:50.860277 env[1192]: time="2025-03-17T18:47:50.860246202Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:47:50.860277 env[1192]: time="2025-03-17T18:47:50.860256933Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:47:50.860522 env[1192]: time="2025-03-17T18:47:50.860478612Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/604cd488c7ecd727f66bad72818ef8d973f04df6654e8729f7647ff3f601fc98 pid=2353 runtime=io.containerd.runc.v2 Mar 17 18:47:50.869759 systemd[1]: Started cri-containerd-604cd488c7ecd727f66bad72818ef8d973f04df6654e8729f7647ff3f601fc98.scope. Mar 17 18:47:50.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit: BPF prog-id=84 op=LOAD Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2353 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:50.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630346364343838633765636437323766363662616437323831386566 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2353 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:50.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630346364343838633765636437323766363662616437323831386566 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit: BPF prog-id=85 op=LOAD Mar 17 18:47:50.877000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009a900 items=0 ppid=2353 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:50.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630346364343838633765636437323766363662616437323831386566 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit: BPF prog-id=86 op=LOAD Mar 17 18:47:50.877000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009a948 items=0 ppid=2353 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:50.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630346364343838633765636437323766363662616437323831386566 Mar 17 18:47:50.877000 audit: BPF prog-id=86 op=UNLOAD Mar 17 18:47:50.877000 audit: BPF prog-id=85 op=UNLOAD Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:50.877000 audit: BPF prog-id=87 op=LOAD Mar 17 18:47:50.877000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009ad58 items=0 ppid=2353 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:50.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630346364343838633765636437323766363662616437323831386566 Mar 17 18:47:50.899483 env[1192]: time="2025-03-17T18:47:50.899448006Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6dc7b4695c-4jbmw,Uid:38fd45b4-7cae-485d-a7d4-566bdfe08587,Namespace:calico-system,Attempt:0,} returns sandbox id \"604cd488c7ecd727f66bad72818ef8d973f04df6654e8729f7647ff3f601fc98\"" Mar 17 18:47:50.900053 kubelet[1439]: E0317 18:47:50.900020 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:50.901041 env[1192]: time="2025-03-17T18:47:50.901009546Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Mar 17 18:47:50.940122 systemd[1]: Removed slice kubepods-besteffort-pod67590e04_876b_4571_9e09_d4cf893b7db1.slice. Mar 17 18:47:51.001385 kubelet[1439]: E0317 18:47:51.001322 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:51.001654 env[1192]: time="2025-03-17T18:47:51.001630816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-js9tm,Uid:eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409,Namespace:calico-system,Attempt:0,}" Mar 17 18:47:51.015193 env[1192]: time="2025-03-17T18:47:51.015009264Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:47:51.015193 env[1192]: time="2025-03-17T18:47:51.015047139Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:47:51.015193 env[1192]: time="2025-03-17T18:47:51.015057419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:47:51.015323 kubelet[1439]: I0317 18:47:51.015091 1439 scope.go:117] "RemoveContainer" containerID="ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8" Mar 17 18:47:51.015608 env[1192]: time="2025-03-17T18:47:51.015259398Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eb3235995e2f5364e25ae6b20accee8e18e6fbf52daa8fd9b0a6c8db19e366c4 pid=2394 runtime=io.containerd.runc.v2 Mar 17 18:47:51.016547 env[1192]: time="2025-03-17T18:47:51.016509656Z" level=info msg="RemoveContainer for \"ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8\"" Mar 17 18:47:51.027169 env[1192]: time="2025-03-17T18:47:51.027122102Z" level=info msg="RemoveContainer for \"ff1859e7e281db0c4d341282293ad419752129547fc80e585f7a74a214dc7bf8\" returns successfully" Mar 17 18:47:51.027727 systemd[1]: Started cri-containerd-eb3235995e2f5364e25ae6b20accee8e18e6fbf52daa8fd9b0a6c8db19e366c4.scope. Mar 17 18:47:51.029699 kubelet[1439]: I0317 18:47:51.028286 1439 scope.go:117] "RemoveContainer" containerID="d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb" Mar 17 18:47:51.030278 env[1192]: time="2025-03-17T18:47:51.030249989Z" level=info msg="RemoveContainer for \"d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb\"" Mar 17 18:47:51.034738 env[1192]: time="2025-03-17T18:47:51.033079627Z" level=info msg="RemoveContainer for \"d846ed41f62bd7af8130b5a3cd31d8ec1f7f6532d52ab94347b74033944a1adb\" returns successfully" Mar 17 18:47:51.034738 env[1192]: time="2025-03-17T18:47:51.033959174Z" level=info msg="RemoveContainer for \"dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d\"" Mar 17 18:47:51.034909 kubelet[1439]: I0317 18:47:51.033218 1439 scope.go:117] "RemoveContainer" containerID="dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d" Mar 17 18:47:51.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit: BPF prog-id=88 op=LOAD Mar 17 18:47:51.036990 env[1192]: time="2025-03-17T18:47:51.036579678Z" level=info msg="RemoveContainer for \"dc292ff0c9ddbafca250ab20ef578b86c460e4775ea0fd8d111b224214e84f3d\" returns successfully" Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2394 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:51.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333233353939356532663533363465323561653662323061636365 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2394 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:51.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333233353939356532663533363465323561653662323061636365 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit: BPF prog-id=89 op=LOAD Mar 17 18:47:51.036000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000324ad0 items=0 ppid=2394 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:51.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333233353939356532663533363465323561653662323061636365 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit: BPF prog-id=90 op=LOAD Mar 17 18:47:51.036000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000324b18 items=0 ppid=2394 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:51.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333233353939356532663533363465323561653662323061636365 Mar 17 18:47:51.036000 audit: BPF prog-id=90 op=UNLOAD Mar 17 18:47:51.036000 audit: BPF prog-id=89 op=UNLOAD Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.036000 audit: BPF prog-id=91 op=LOAD Mar 17 18:47:51.036000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000324f28 items=0 ppid=2394 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:51.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333233353939356532663533363465323561653662323061636365 Mar 17 18:47:51.047109 env[1192]: time="2025-03-17T18:47:51.047074943Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-js9tm,Uid:eb3bbdf1-ee8f-4ee7-b8e0-f8d559ac5409,Namespace:calico-system,Attempt:0,} returns sandbox id \"eb3235995e2f5364e25ae6b20accee8e18e6fbf52daa8fd9b0a6c8db19e366c4\"" Mar 17 18:47:51.047868 kubelet[1439]: E0317 18:47:51.047845 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:51.049366 env[1192]: time="2025-03-17T18:47:51.049341519Z" level=info msg="CreateContainer within sandbox \"eb3235995e2f5364e25ae6b20accee8e18e6fbf52daa8fd9b0a6c8db19e366c4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 18:47:51.061178 env[1192]: time="2025-03-17T18:47:51.061144246Z" level=info msg="CreateContainer within sandbox \"eb3235995e2f5364e25ae6b20accee8e18e6fbf52daa8fd9b0a6c8db19e366c4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"44fb698eaeed9f2aaff339f1f2b52d9b5b07a6d21aadff719d1f4aae2d684081\"" Mar 17 18:47:51.061485 env[1192]: time="2025-03-17T18:47:51.061455500Z" level=info msg="StartContainer for \"44fb698eaeed9f2aaff339f1f2b52d9b5b07a6d21aadff719d1f4aae2d684081\"" Mar 17 18:47:51.074237 systemd[1]: Started cri-containerd-44fb698eaeed9f2aaff339f1f2b52d9b5b07a6d21aadff719d1f4aae2d684081.scope. Mar 17 18:47:51.084000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.084000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f11d01e6b18 items=0 ppid=2394 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:51.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666236393865616565643966326161666633333966316632623532 Mar 17 18:47:51.084000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.084000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.084000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.084000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.084000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.084000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.084000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.084000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.084000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.084000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.084000 audit: BPF prog-id=92 op=LOAD Mar 17 18:47:51.084000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030ab38 items=0 ppid=2394 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:51.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666236393865616565643966326161666633333966316632623532 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit: BPF prog-id=93 op=LOAD Mar 17 18:47:51.086000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030ab88 items=0 ppid=2394 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:51.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666236393865616565643966326161666633333966316632623532 Mar 17 18:47:51.086000 audit: BPF prog-id=93 op=UNLOAD Mar 17 18:47:51.086000 audit: BPF prog-id=92 op=UNLOAD Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:51.086000 audit: BPF prog-id=94 op=LOAD Mar 17 18:47:51.086000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030ac18 items=0 ppid=2394 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:51.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666236393865616565643966326161666633333966316632623532 Mar 17 18:47:51.098612 env[1192]: time="2025-03-17T18:47:51.098545581Z" level=info msg="StartContainer for \"44fb698eaeed9f2aaff339f1f2b52d9b5b07a6d21aadff719d1f4aae2d684081\" returns successfully" Mar 17 18:47:51.107612 systemd[1]: cri-containerd-44fb698eaeed9f2aaff339f1f2b52d9b5b07a6d21aadff719d1f4aae2d684081.scope: Deactivated successfully. Mar 17 18:47:51.115000 audit: BPF prog-id=94 op=UNLOAD Mar 17 18:47:51.146167 env[1192]: time="2025-03-17T18:47:51.146117971Z" level=info msg="shim disconnected" id=44fb698eaeed9f2aaff339f1f2b52d9b5b07a6d21aadff719d1f4aae2d684081 Mar 17 18:47:51.146167 env[1192]: time="2025-03-17T18:47:51.146165255Z" level=warning msg="cleaning up after shim disconnected" id=44fb698eaeed9f2aaff339f1f2b52d9b5b07a6d21aadff719d1f4aae2d684081 namespace=k8s.io Mar 17 18:47:51.146333 env[1192]: time="2025-03-17T18:47:51.146174041Z" level=info msg="cleaning up dead shim" Mar 17 18:47:51.152970 env[1192]: time="2025-03-17T18:47:51.152929903Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:47:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2476 runtime=io.containerd.runc.v2\n" Mar 17 18:47:51.607048 kubelet[1439]: E0317 18:47:51.607002 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:52.018135 kubelet[1439]: E0317 18:47:52.018113 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:52.019483 env[1192]: time="2025-03-17T18:47:52.019433175Z" level=info msg="CreateContainer within sandbox \"eb3235995e2f5364e25ae6b20accee8e18e6fbf52daa8fd9b0a6c8db19e366c4\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 18:47:52.030071 env[1192]: time="2025-03-17T18:47:52.030026703Z" level=info msg="CreateContainer within sandbox \"eb3235995e2f5364e25ae6b20accee8e18e6fbf52daa8fd9b0a6c8db19e366c4\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2a1692e654e451fa9048ddb943229373d9ef60c76f83c12b5187d87be7ebffa7\"" Mar 17 18:47:52.030443 env[1192]: time="2025-03-17T18:47:52.030412904Z" level=info msg="StartContainer for \"2a1692e654e451fa9048ddb943229373d9ef60c76f83c12b5187d87be7ebffa7\"" Mar 17 18:47:52.045117 systemd[1]: Started cri-containerd-2a1692e654e451fa9048ddb943229373d9ef60c76f83c12b5187d87be7ebffa7.scope. Mar 17 18:47:52.054000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.060715 kernel: kauditd_printk_skb: 206 callbacks suppressed Mar 17 18:47:52.060805 kernel: audit: type=1400 audit(1742237272.054:596): avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.060826 kernel: audit: type=1300 audit(1742237272.054:596): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe708361c28 items=0 ppid=2394 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:52.054000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe708361c28 items=0 ppid=2394 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:52.065677 kernel: audit: type=1327 audit(1742237272.054:596): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313639326536353465343531666139303438646462393433323239 Mar 17 18:47:52.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313639326536353465343531666139303438646462393433323239 Mar 17 18:47:52.055000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.073699 kernel: audit: type=1400 audit(1742237272.055:597): avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.073739 kernel: audit: type=1400 audit(1742237272.055:597): avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.055000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.055000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.079948 kernel: audit: type=1400 audit(1742237272.055:597): avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.080011 kernel: audit: type=1400 audit(1742237272.055:597): avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.055000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.055000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.087131 env[1192]: time="2025-03-17T18:47:52.087096874Z" level=info msg="StartContainer for \"2a1692e654e451fa9048ddb943229373d9ef60c76f83c12b5187d87be7ebffa7\" returns successfully" Mar 17 18:47:52.090860 kernel: audit: type=1400 audit(1742237272.055:597): avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.090930 kernel: audit: type=1400 audit(1742237272.055:597): avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.055000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.055000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.094360 kernel: audit: type=1400 audit(1742237272.055:597): avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.055000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.055000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.055000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.055000 audit: BPF prog-id=95 op=LOAD Mar 17 18:47:52.055000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001bfd88 items=0 ppid=2394 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:52.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313639326536353465343531666139303438646462393433323239 Mar 17 18:47:52.058000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.058000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.058000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.058000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.058000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.058000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.058000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.058000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.058000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.058000 audit: BPF prog-id=96 op=LOAD Mar 17 18:47:52.058000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001bfdd8 items=0 ppid=2394 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:52.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313639326536353465343531666139303438646462393433323239 Mar 17 18:47:52.063000 audit: BPF prog-id=96 op=UNLOAD Mar 17 18:47:52.063000 audit: BPF prog-id=95 op=UNLOAD Mar 17 18:47:52.063000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.063000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.063000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.063000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.063000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.063000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.063000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.063000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.063000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.063000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:52.063000 audit: BPF prog-id=97 op=LOAD Mar 17 18:47:52.063000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001bfe68 items=0 ppid=2394 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:52.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313639326536353465343531666139303438646462393433323239 Mar 17 18:47:52.373288 systemd[1]: cri-containerd-2a1692e654e451fa9048ddb943229373d9ef60c76f83c12b5187d87be7ebffa7.scope: Deactivated successfully. Mar 17 18:47:52.376000 audit: BPF prog-id=97 op=UNLOAD Mar 17 18:47:52.451329 env[1192]: time="2025-03-17T18:47:52.451268201Z" level=info msg="shim disconnected" id=2a1692e654e451fa9048ddb943229373d9ef60c76f83c12b5187d87be7ebffa7 Mar 17 18:47:52.451329 env[1192]: time="2025-03-17T18:47:52.451319292Z" level=warning msg="cleaning up after shim disconnected" id=2a1692e654e451fa9048ddb943229373d9ef60c76f83c12b5187d87be7ebffa7 namespace=k8s.io Mar 17 18:47:52.451329 env[1192]: time="2025-03-17T18:47:52.451327609Z" level=info msg="cleaning up dead shim" Mar 17 18:47:52.457202 env[1192]: time="2025-03-17T18:47:52.457178319Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:47:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2540 runtime=io.containerd.runc.v2\n" Mar 17 18:47:52.607403 kubelet[1439]: E0317 18:47:52.607358 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:52.636756 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2a1692e654e451fa9048ddb943229373d9ef60c76f83c12b5187d87be7ebffa7-rootfs.mount: Deactivated successfully. Mar 17 18:47:52.938039 kubelet[1439]: I0317 18:47:52.938002 1439 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="67590e04-876b-4571-9e09-d4cf893b7db1" path="/var/lib/kubelet/pods/67590e04-876b-4571-9e09-d4cf893b7db1/volumes" Mar 17 18:47:53.020457 kubelet[1439]: E0317 18:47:53.020436 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:53.030715 env[1192]: time="2025-03-17T18:47:53.030632818Z" level=info msg="CreateContainer within sandbox \"eb3235995e2f5364e25ae6b20accee8e18e6fbf52daa8fd9b0a6c8db19e366c4\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 18:47:53.044492 env[1192]: time="2025-03-17T18:47:53.044449647Z" level=info msg="CreateContainer within sandbox \"eb3235995e2f5364e25ae6b20accee8e18e6fbf52daa8fd9b0a6c8db19e366c4\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b71e75d0f6ae5165f1a85b56b619f0b6a072c1944579b52246c8823fea20f158\"" Mar 17 18:47:53.044948 env[1192]: time="2025-03-17T18:47:53.044910995Z" level=info msg="StartContainer for \"b71e75d0f6ae5165f1a85b56b619f0b6a072c1944579b52246c8823fea20f158\"" Mar 17 18:47:53.052911 env[1192]: time="2025-03-17T18:47:53.052879159Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:53.054929 env[1192]: time="2025-03-17T18:47:53.054890335Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:53.056413 env[1192]: time="2025-03-17T18:47:53.056387781Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:53.057777 env[1192]: time="2025-03-17T18:47:53.057752265Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:53.057985 env[1192]: time="2025-03-17T18:47:53.057956247Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Mar 17 18:47:53.059904 systemd[1]: Started cri-containerd-b71e75d0f6ae5165f1a85b56b619f0b6a072c1944579b52246c8823fea20f158.scope. Mar 17 18:47:53.063929 env[1192]: time="2025-03-17T18:47:53.063899688Z" level=info msg="CreateContainer within sandbox \"604cd488c7ecd727f66bad72818ef8d973f04df6654e8729f7647ff3f601fc98\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3f93e9faa8 items=0 ppid=2394 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:53.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316537356430663661653531363566316138356235366236313966 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit: BPF prog-id=98 op=LOAD Mar 17 18:47:53.077000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d7ba8 items=0 ppid=2394 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:53.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316537356430663661653531363566316138356235366236313966 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit: BPF prog-id=99 op=LOAD Mar 17 18:47:53.077000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d7bf8 items=0 ppid=2394 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:53.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316537356430663661653531363566316138356235366236313966 Mar 17 18:47:53.077000 audit: BPF prog-id=99 op=UNLOAD Mar 17 18:47:53.077000 audit: BPF prog-id=98 op=UNLOAD Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.077000 audit: BPF prog-id=100 op=LOAD Mar 17 18:47:53.077000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d7c88 items=0 ppid=2394 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:53.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316537356430663661653531363566316138356235366236313966 Mar 17 18:47:53.275894 env[1192]: time="2025-03-17T18:47:53.275777343Z" level=info msg="StartContainer for \"b71e75d0f6ae5165f1a85b56b619f0b6a072c1944579b52246c8823fea20f158\" returns successfully" Mar 17 18:47:53.284957 env[1192]: time="2025-03-17T18:47:53.284913023Z" level=info msg="CreateContainer within sandbox \"604cd488c7ecd727f66bad72818ef8d973f04df6654e8729f7647ff3f601fc98\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"400d2417c17e1fbb70f7d45cb47a53d21e0d2c20cdae23eb86c4007f05f11f56\"" Mar 17 18:47:53.285436 env[1192]: time="2025-03-17T18:47:53.285414841Z" level=info msg="StartContainer for \"400d2417c17e1fbb70f7d45cb47a53d21e0d2c20cdae23eb86c4007f05f11f56\"" Mar 17 18:47:53.299007 systemd[1]: Started cri-containerd-400d2417c17e1fbb70f7d45cb47a53d21e0d2c20cdae23eb86c4007f05f11f56.scope. Mar 17 18:47:53.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.308000 audit: BPF prog-id=101 op=LOAD Mar 17 18:47:53.308000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.308000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2353 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:53.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306432343137633137653166626237306637643435636234376135 Mar 17 18:47:53.309000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.309000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2353 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:53.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306432343137633137653166626237306637643435636234376135 Mar 17 18:47:53.309000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.309000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.309000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.309000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.309000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.309000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.309000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.309000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.309000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.309000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.309000 audit: BPF prog-id=102 op=LOAD Mar 17 18:47:53.309000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c6810 items=0 ppid=2353 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:53.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306432343137633137653166626237306637643435636234376135 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit: BPF prog-id=103 op=LOAD Mar 17 18:47:53.310000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c6858 items=0 ppid=2353 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:53.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306432343137633137653166626237306637643435636234376135 Mar 17 18:47:53.310000 audit: BPF prog-id=103 op=UNLOAD Mar 17 18:47:53.310000 audit: BPF prog-id=102 op=UNLOAD Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:53.310000 audit: BPF prog-id=104 op=LOAD Mar 17 18:47:53.310000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c6c68 items=0 ppid=2353 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:53.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306432343137633137653166626237306637643435636234376135 Mar 17 18:47:53.339324 env[1192]: time="2025-03-17T18:47:53.336418270Z" level=info msg="StartContainer for \"400d2417c17e1fbb70f7d45cb47a53d21e0d2c20cdae23eb86c4007f05f11f56\" returns successfully" Mar 17 18:47:53.608541 kubelet[1439]: E0317 18:47:53.608423 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:54.023633 kubelet[1439]: E0317 18:47:54.023383 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:54.025005 kubelet[1439]: E0317 18:47:54.024961 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:54.030879 kubelet[1439]: I0317 18:47:54.030833 1439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6dc7b4695c-4jbmw" podStartSLOduration=1.872485712 podStartE2EDuration="4.030815978s" podCreationTimestamp="2025-03-17 18:47:50 +0000 UTC" firstStartedPulling="2025-03-17 18:47:50.900755453 +0000 UTC m=+44.550024714" lastFinishedPulling="2025-03-17 18:47:53.059085719 +0000 UTC m=+46.708354980" observedRunningTime="2025-03-17 18:47:54.030770469 +0000 UTC m=+47.680039730" watchObservedRunningTime="2025-03-17 18:47:54.030815978 +0000 UTC m=+47.680085239" Mar 17 18:47:54.044000 audit[2675]: NETFILTER_CFG table=filter:69 family=2 entries=17 op=nft_register_rule pid=2675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:54.044000 audit[2675]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe985504a0 a2=0 a3=7ffe9855048c items=0 ppid=1657 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:54.047985 kubelet[1439]: I0317 18:47:54.047950 1439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-js9tm" podStartSLOduration=4.047934773 podStartE2EDuration="4.047934773s" podCreationTimestamp="2025-03-17 18:47:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:47:54.047730692 +0000 UTC m=+47.696999954" watchObservedRunningTime="2025-03-17 18:47:54.047934773 +0000 UTC m=+47.697204034" Mar 17 18:47:54.050000 audit[2675]: NETFILTER_CFG table=nat:70 family=2 entries=19 op=nft_register_chain pid=2675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:54.050000 audit[2675]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe985504a0 a2=0 a3=7ffe9855048c items=0 ppid=1657 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.050000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:54.477000 audit[2728]: AVC avc: denied { write } for pid=2728 comm="tee" name="fd" dev="proc" ino=21226 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:47:54.478000 audit[2720]: AVC avc: denied { write } for pid=2720 comm="tee" name="fd" dev="proc" ino=21229 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:47:54.477000 audit[2728]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed08e2a2a a2=241 a3=1b6 items=1 ppid=2692 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.477000 audit: CWD cwd="/etc/service/enabled/bird/log" Mar 17 18:47:54.477000 audit: PATH item=0 name="/dev/fd/63" inode=21223 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:47:54.477000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:47:54.478000 audit[2720]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeecc6ea29 a2=241 a3=1b6 items=1 ppid=2696 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.478000 audit: CWD cwd="/etc/service/enabled/felix/log" Mar 17 18:47:54.478000 audit: PATH item=0 name="/dev/fd/63" inode=21220 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:47:54.478000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:47:54.486000 audit[2741]: AVC avc: denied { write } for pid=2741 comm="tee" name="fd" dev="proc" ino=22607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:47:54.486000 audit[2741]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff43c7ca1a a2=241 a3=1b6 items=1 ppid=2708 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.486000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Mar 17 18:47:54.486000 audit: PATH item=0 name="/dev/fd/63" inode=22601 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:47:54.486000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:47:54.502000 audit[2755]: AVC avc: denied { write } for pid=2755 comm="tee" name="fd" dev="proc" ino=22618 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:47:54.502000 audit[2755]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3cfc4a2b a2=241 a3=1b6 items=1 ppid=2691 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.502000 audit: CWD cwd="/etc/service/enabled/cni/log" Mar 17 18:47:54.502000 audit: PATH item=0 name="/dev/fd/63" inode=22612 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:47:54.502000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:47:54.506000 audit[2768]: AVC avc: denied { write } for pid=2768 comm="tee" name="fd" dev="proc" ino=20396 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:47:54.506000 audit[2768]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd317a2a29 a2=241 a3=1b6 items=1 ppid=2700 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.506000 audit: CWD cwd="/etc/service/enabled/confd/log" Mar 17 18:47:54.506000 audit: PATH item=0 name="/dev/fd/63" inode=20393 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:47:54.506000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:47:54.507000 audit[2762]: AVC avc: denied { write } for pid=2762 comm="tee" name="fd" dev="proc" ino=20400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:47:54.507000 audit[2762]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea3ac2a19 a2=241 a3=1b6 items=1 ppid=2701 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.507000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Mar 17 18:47:54.507000 audit: PATH item=0 name="/dev/fd/63" inode=20389 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:47:54.507000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:47:54.518000 audit[2760]: AVC avc: denied { write } for pid=2760 comm="tee" name="fd" dev="proc" ino=21702 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:47:54.518000 audit[2760]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff86150a29 a2=241 a3=1b6 items=1 ppid=2690 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.518000 audit: CWD cwd="/etc/service/enabled/bird6/log" Mar 17 18:47:54.518000 audit: PATH item=0 name="/dev/fd/63" inode=22615 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:47:54.518000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:47:54.583000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.583000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.583000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.583000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.583000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.583000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.583000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.583000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.583000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.583000 audit: BPF prog-id=105 op=LOAD Mar 17 18:47:54.583000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff14a346b0 a2=98 a3=3 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.583000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.584000 audit: BPF prog-id=105 op=UNLOAD Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit: BPF prog-id=106 op=LOAD Mar 17 18:47:54.585000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff14a34490 a2=74 a3=540051 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.585000 audit: BPF prog-id=106 op=UNLOAD Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.585000 audit: BPF prog-id=107 op=LOAD Mar 17 18:47:54.585000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff14a344c0 a2=94 a3=2 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.586000 audit: BPF prog-id=107 op=UNLOAD Mar 17 18:47:54.609553 kubelet[1439]: E0317 18:47:54.609504 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:54.688000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.688000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.688000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.688000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.688000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.688000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.688000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.688000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.688000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.688000 audit: BPF prog-id=108 op=LOAD Mar 17 18:47:54.688000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff14a34380 a2=40 a3=1 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.688000 audit: BPF prog-id=108 op=UNLOAD Mar 17 18:47:54.688000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.688000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff14a34450 a2=50 a3=7fff14a34530 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.695000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.695000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff14a34390 a2=28 a3=0 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.695000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.695000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff14a343c0 a2=28 a3=0 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.695000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.695000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff14a342d0 a2=28 a3=0 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.695000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.695000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff14a343e0 a2=28 a3=0 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.695000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.695000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff14a343c0 a2=28 a3=0 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.695000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.695000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff14a343b0 a2=28 a3=0 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.695000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.695000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff14a343e0 a2=28 a3=0 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.695000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.695000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff14a343c0 a2=28 a3=0 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.695000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.695000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff14a343e0 a2=28 a3=0 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.695000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.695000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff14a343b0 a2=28 a3=0 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.695000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.695000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff14a34420 a2=28 a3=0 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff14a341d0 a2=50 a3=1 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit: BPF prog-id=109 op=LOAD Mar 17 18:47:54.696000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff14a341d0 a2=94 a3=5 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.696000 audit: BPF prog-id=109 op=UNLOAD Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff14a34280 a2=50 a3=1 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff14a343a0 a2=4 a3=38 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:47:54.696000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff14a343f0 a2=94 a3=6 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:47:54.696000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff14a33ba0 a2=94 a3=83 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.696000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:47:54.696000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff14a33ba0 a2=94 a3=83 items=0 ppid=2698 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit: BPF prog-id=110 op=LOAD Mar 17 18:47:54.702000 audit[2812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd50126360 a2=98 a3=1999999999999999 items=0 ppid=2698 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.702000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:47:54.702000 audit: BPF prog-id=110 op=UNLOAD Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit: BPF prog-id=111 op=LOAD Mar 17 18:47:54.702000 audit[2812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd50126240 a2=74 a3=ffff items=0 ppid=2698 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.702000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:47:54.702000 audit: BPF prog-id=111 op=UNLOAD Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.702000 audit: BPF prog-id=112 op=LOAD Mar 17 18:47:54.702000 audit[2812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd50126280 a2=40 a3=7ffd50126460 items=0 ppid=2698 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.702000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:47:54.702000 audit: BPF prog-id=112 op=UNLOAD Mar 17 18:47:54.737962 systemd-networkd[1026]: vxlan.calico: Link UP Mar 17 18:47:54.737969 systemd-networkd[1026]: vxlan.calico: Gained carrier Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit: BPF prog-id=113 op=LOAD Mar 17 18:47:54.753000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdfba12a40 a2=98 a3=ffffffff items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.753000 audit: BPF prog-id=113 op=UNLOAD Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.753000 audit: BPF prog-id=114 op=LOAD Mar 17 18:47:54.753000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdfba12850 a2=74 a3=540051 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit: BPF prog-id=114 op=UNLOAD Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit: BPF prog-id=115 op=LOAD Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdfba12880 a2=94 a3=2 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit: BPF prog-id=115 op=UNLOAD Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdfba12750 a2=28 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfba12780 a2=28 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfba12690 a2=28 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdfba127a0 a2=28 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdfba12780 a2=28 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdfba12770 a2=28 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdfba127a0 a2=28 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfba12780 a2=28 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfba127a0 a2=28 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfba12770 a2=28 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdfba127e0 a2=28 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.754000 audit: BPF prog-id=116 op=LOAD Mar 17 18:47:54.754000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdfba12650 a2=40 a3=0 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.754000 audit: BPF prog-id=116 op=UNLOAD Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdfba12640 a2=50 a3=2800 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdfba12640 a2=50 a3=2800 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit: BPF prog-id=117 op=LOAD Mar 17 18:47:54.755000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdfba11e60 a2=94 a3=2 items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.755000 audit: BPF prog-id=117 op=UNLOAD Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { perfmon } for pid=2842 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit[2842]: AVC avc: denied { bpf } for pid=2842 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.755000 audit: BPF prog-id=118 op=LOAD Mar 17 18:47:54.755000 audit[2842]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdfba11f60 a2=94 a3=2d items=0 ppid=2698 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit: BPF prog-id=119 op=LOAD Mar 17 18:47:54.761000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe313f1710 a2=98 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.761000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.761000 audit: BPF prog-id=119 op=UNLOAD Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit: BPF prog-id=120 op=LOAD Mar 17 18:47:54.761000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe313f14f0 a2=74 a3=540051 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.761000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.761000 audit: BPF prog-id=120 op=UNLOAD Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.761000 audit: BPF prog-id=121 op=LOAD Mar 17 18:47:54.761000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe313f1520 a2=94 a3=2 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.761000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.761000 audit: BPF prog-id=121 op=UNLOAD Mar 17 18:47:54.862000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.862000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.862000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.862000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.862000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.862000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.862000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.862000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.862000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.862000 audit: BPF prog-id=122 op=LOAD Mar 17 18:47:54.862000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe313f13e0 a2=40 a3=1 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.862000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.862000 audit: BPF prog-id=122 op=UNLOAD Mar 17 18:47:54.862000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.862000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe313f14b0 a2=50 a3=7ffe313f1590 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.862000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.869000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.869000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe313f13f0 a2=28 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.869000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.869000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.869000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe313f1420 a2=28 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.869000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.869000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.869000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe313f1330 a2=28 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.869000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.869000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.869000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe313f1440 a2=28 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.869000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.869000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.869000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe313f1420 a2=28 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.869000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe313f1410 a2=28 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe313f1440 a2=28 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe313f1420 a2=28 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe313f1440 a2=28 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe313f1410 a2=28 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe313f1480 a2=28 a3=0 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe313f1230 a2=50 a3=1 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit: BPF prog-id=123 op=LOAD Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe313f1230 a2=94 a3=5 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit: BPF prog-id=123 op=UNLOAD Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe313f12e0 a2=50 a3=1 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe313f1400 a2=4 a3=38 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { confidentiality } for pid=2850 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe313f1450 a2=94 a3=6 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { confidentiality } for pid=2850 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe313f0c00 a2=94 a3=83 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.870000 audit[2850]: AVC avc: denied { confidentiality } for pid=2850 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:47:54.870000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe313f0c00 a2=94 a3=83 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.871000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.871000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe313f2640 a2=10 a3=208 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.871000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.871000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.871000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe313f24e0 a2=10 a3=3 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.871000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.871000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.871000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe313f2480 a2=10 a3=3 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.871000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.871000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:54.871000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe313f2480 a2=10 a3=7 items=0 ppid=2698 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.871000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:47:54.878000 audit: BPF prog-id=118 op=UNLOAD Mar 17 18:47:54.915000 audit[2871]: NETFILTER_CFG table=nat:71 family=2 entries=15 op=nft_register_chain pid=2871 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:47:54.915000 audit[2871]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdb06232a0 a2=0 a3=7ffdb062328c items=0 ppid=2698 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.915000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:47:54.918000 audit[2872]: NETFILTER_CFG table=mangle:72 family=2 entries=16 op=nft_register_chain pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:47:54.919000 audit[2876]: NETFILTER_CFG table=filter:73 family=2 entries=39 op=nft_register_chain pid=2876 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:47:54.919000 audit[2876]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc8c686530 a2=0 a3=7ffc8c68651c items=0 ppid=2698 pid=2876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.919000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:47:54.918000 audit[2872]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc6e10f2b0 a2=0 a3=7ffc6e10f29c items=0 ppid=2698 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.918000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:47:54.922000 audit[2870]: NETFILTER_CFG table=raw:74 family=2 entries=21 op=nft_register_chain pid=2870 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:47:54.922000 audit[2870]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe08fff930 a2=0 a3=7ffe08fff91c items=0 ppid=2698 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:54.922000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:47:55.026076 kubelet[1439]: E0317 18:47:55.025991 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:55.026439 kubelet[1439]: E0317 18:47:55.026416 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:55.040284 systemd[1]: run-containerd-runc-k8s.io-b71e75d0f6ae5165f1a85b56b619f0b6a072c1944579b52246c8823fea20f158-runc.J0TKa5.mount: Deactivated successfully. Mar 17 18:47:55.536000 audit[2906]: NETFILTER_CFG table=filter:75 family=2 entries=16 op=nft_register_rule pid=2906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:55.536000 audit[2906]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffde04a8e70 a2=0 a3=7ffde04a8e5c items=0 ppid=1657 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:55.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:55.541000 audit[2906]: NETFILTER_CFG table=nat:76 family=2 entries=14 op=nft_register_rule pid=2906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:55.541000 audit[2906]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffde04a8e70 a2=0 a3=0 items=0 ppid=1657 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:55.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:55.555000 audit[2908]: NETFILTER_CFG table=filter:77 family=2 entries=13 op=nft_register_rule pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:55.555000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff273be8f0 a2=0 a3=7fff273be8dc items=0 ppid=1657 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:55.555000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:55.564000 audit[2908]: NETFILTER_CFG table=nat:78 family=2 entries=35 op=nft_register_chain pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:55.564000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff273be8f0 a2=0 a3=7fff273be8dc items=0 ppid=1657 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:55.564000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:55.610315 kubelet[1439]: E0317 18:47:55.610280 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:56.027410 kubelet[1439]: E0317 18:47:56.027383 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:47:56.182818 systemd-networkd[1026]: vxlan.calico: Gained IPv6LL Mar 17 18:47:56.610424 kubelet[1439]: E0317 18:47:56.610380 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:56.936188 env[1192]: time="2025-03-17T18:47:56.936149248Z" level=info msg="StopPodSandbox for \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\"" Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:56.973 [INFO][2929] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:56.974 [INFO][2929] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" iface="eth0" netns="/var/run/netns/cni-7a35c29e-13bb-09cb-7902-1ca9f5fe0b6c" Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:56.974 [INFO][2929] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" iface="eth0" netns="/var/run/netns/cni-7a35c29e-13bb-09cb-7902-1ca9f5fe0b6c" Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:56.974 [INFO][2929] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" iface="eth0" netns="/var/run/netns/cni-7a35c29e-13bb-09cb-7902-1ca9f5fe0b6c" Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:56.974 [INFO][2929] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:56.974 [INFO][2929] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:56.994 [INFO][2937] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" HandleID="k8s-pod-network.aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:56.994 [INFO][2937] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:56.994 [INFO][2937] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:57.000 [WARNING][2937] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" HandleID="k8s-pod-network.aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:57.000 [INFO][2937] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" HandleID="k8s-pod-network.aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:57.003 [INFO][2937] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:47:57.006369 env[1192]: 2025-03-17 18:47:57.004 [INFO][2929] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:47:57.006825 env[1192]: time="2025-03-17T18:47:57.006548934Z" level=info msg="TearDown network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\" successfully" Mar 17 18:47:57.006825 env[1192]: time="2025-03-17T18:47:57.006589583Z" level=info msg="StopPodSandbox for \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\" returns successfully" Mar 17 18:47:57.007163 env[1192]: time="2025-03-17T18:47:57.007135941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6bp86,Uid:4f62d233-a2bf-4293-97c9-b918fbcd2fee,Namespace:calico-system,Attempt:1,}" Mar 17 18:47:57.008244 systemd[1]: run-netns-cni\x2d7a35c29e\x2d13bb\x2d09cb\x2d7902\x2d1ca9f5fe0b6c.mount: Deactivated successfully. Mar 17 18:47:57.141432 systemd-networkd[1026]: calif8b0b6efaa4: Link UP Mar 17 18:47:57.143700 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:47:57.143817 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif8b0b6efaa4: link becomes ready Mar 17 18:47:57.143942 systemd-networkd[1026]: calif8b0b6efaa4: Gained carrier Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.086 [INFO][2945] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-csi--node--driver--6bp86-eth0 csi-node-driver- calico-system 4f62d233-a2bf-4293-97c9-b918fbcd2fee 1244 0 2025-03-17 18:47:07 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.143 csi-node-driver-6bp86 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calif8b0b6efaa4 [] []}} ContainerID="38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" Namespace="calico-system" Pod="csi-node-driver-6bp86" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6bp86-" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.086 [INFO][2945] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" Namespace="calico-system" Pod="csi-node-driver-6bp86" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.110 [INFO][2959] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" HandleID="k8s-pod-network.38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.116 [INFO][2959] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" HandleID="k8s-pod-network.38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dceb0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.143", "pod":"csi-node-driver-6bp86", "timestamp":"2025-03-17 18:47:57.110260649 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.116 [INFO][2959] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.116 [INFO][2959] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.116 [INFO][2959] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.118 [INFO][2959] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" host="10.0.0.143" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.121 [INFO][2959] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.143" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.125 [INFO][2959] ipam/ipam.go 489: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.126 [INFO][2959] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.128 [INFO][2959] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.128 [INFO][2959] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" host="10.0.0.143" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.129 [INFO][2959] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.132 [INFO][2959] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" host="10.0.0.143" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.137 [INFO][2959] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.1/26] block=192.168.66.0/26 handle="k8s-pod-network.38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" host="10.0.0.143" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.137 [INFO][2959] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.1/26] handle="k8s-pod-network.38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" host="10.0.0.143" Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.137 [INFO][2959] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:47:57.155397 env[1192]: 2025-03-17 18:47:57.137 [INFO][2959] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.1/26] IPv6=[] ContainerID="38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" HandleID="k8s-pod-network.38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:47:57.156077 env[1192]: 2025-03-17 18:47:57.139 [INFO][2945] cni-plugin/k8s.go 386: Populated endpoint ContainerID="38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" Namespace="calico-system" Pod="csi-node-driver-6bp86" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--6bp86-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f62d233-a2bf-4293-97c9-b918fbcd2fee", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 47, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"csi-node-driver-6bp86", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif8b0b6efaa4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:47:57.156077 env[1192]: 2025-03-17 18:47:57.139 [INFO][2945] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.1/32] ContainerID="38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" Namespace="calico-system" Pod="csi-node-driver-6bp86" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:47:57.156077 env[1192]: 2025-03-17 18:47:57.139 [INFO][2945] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif8b0b6efaa4 ContainerID="38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" Namespace="calico-system" Pod="csi-node-driver-6bp86" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:47:57.156077 env[1192]: 2025-03-17 18:47:57.144 [INFO][2945] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" Namespace="calico-system" Pod="csi-node-driver-6bp86" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:47:57.156077 env[1192]: 2025-03-17 18:47:57.144 [INFO][2945] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" Namespace="calico-system" Pod="csi-node-driver-6bp86" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--6bp86-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f62d233-a2bf-4293-97c9-b918fbcd2fee", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 47, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d", Pod:"csi-node-driver-6bp86", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif8b0b6efaa4", MAC:"c6:43:fe:20:04:c1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:47:57.156077 env[1192]: 2025-03-17 18:47:57.153 [INFO][2945] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d" Namespace="calico-system" Pod="csi-node-driver-6bp86" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:47:57.169688 kernel: kauditd_printk_skb: 667 callbacks suppressed Mar 17 18:47:57.169804 kernel: audit: type=1325 audit(1742237277.160:735): table=filter:79 family=2 entries=34 op=nft_register_chain pid=2980 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:47:57.169825 kernel: audit: type=1300 audit(1742237277.160:735): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffda7087fb0 a2=0 a3=7ffda7087f9c items=0 ppid=2698 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:57.169840 kernel: audit: type=1327 audit(1742237277.160:735): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:47:57.160000 audit[2980]: NETFILTER_CFG table=filter:79 family=2 entries=34 op=nft_register_chain pid=2980 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:47:57.160000 audit[2980]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffda7087fb0 a2=0 a3=7ffda7087f9c items=0 ppid=2698 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:57.160000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:47:57.170005 env[1192]: time="2025-03-17T18:47:57.165241955Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:47:57.170005 env[1192]: time="2025-03-17T18:47:57.165285219Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:47:57.170005 env[1192]: time="2025-03-17T18:47:57.165296121Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:47:57.170005 env[1192]: time="2025-03-17T18:47:57.165538284Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d pid=2987 runtime=io.containerd.runc.v2 Mar 17 18:47:57.183716 systemd[1]: Started cri-containerd-38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d.scope. Mar 17 18:47:57.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.197106 kernel: audit: type=1400 audit(1742237277.190:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.197181 kernel: audit: type=1400 audit(1742237277.190:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.197206 kernel: audit: type=1400 audit(1742237277.190:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.199953 kernel: audit: type=1400 audit(1742237277.190:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.205713 kernel: audit: type=1400 audit(1742237277.190:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.205754 kernel: audit: type=1400 audit(1742237277.190:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.211497 kernel: audit: type=1400 audit(1742237277.190:742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit: BPF prog-id=124 op=LOAD Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2987 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:57.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643630373731366432343430653666313534363563336663633032 Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2987 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:57.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643630373731366432343430653666313534363563336663633032 Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.193000 audit: BPF prog-id=125 op=LOAD Mar 17 18:47:57.193000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001d4b50 items=0 ppid=2987 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:57.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643630373731366432343430653666313534363563336663633032 Mar 17 18:47:57.199000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.199000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.199000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.199000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.199000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.199000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.199000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.199000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.199000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.199000 audit: BPF prog-id=126 op=LOAD Mar 17 18:47:57.199000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001d4b98 items=0 ppid=2987 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:57.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643630373731366432343430653666313534363563336663633032 Mar 17 18:47:57.202000 audit: BPF prog-id=126 op=UNLOAD Mar 17 18:47:57.202000 audit: BPF prog-id=125 op=UNLOAD Mar 17 18:47:57.202000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.202000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.202000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.202000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.202000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.202000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.202000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.202000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.202000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.202000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:57.202000 audit: BPF prog-id=127 op=LOAD Mar 17 18:47:57.202000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001d4fa8 items=0 ppid=2987 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:57.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643630373731366432343430653666313534363563336663633032 Mar 17 18:47:57.211653 systemd-resolved[1140]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Mar 17 18:47:57.219397 env[1192]: time="2025-03-17T18:47:57.219367108Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6bp86,Uid:4f62d233-a2bf-4293-97c9-b918fbcd2fee,Namespace:calico-system,Attempt:1,} returns sandbox id \"38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d\"" Mar 17 18:47:57.220729 env[1192]: time="2025-03-17T18:47:57.220697098Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Mar 17 18:47:57.611275 kubelet[1439]: E0317 18:47:57.611202 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:58.230861 systemd-networkd[1026]: calif8b0b6efaa4: Gained IPv6LL Mar 17 18:47:58.541000 audit[3021]: NETFILTER_CFG table=filter:80 family=2 entries=10 op=nft_register_rule pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:58.541000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe960c0780 a2=0 a3=7ffe960c076c items=0 ppid=1657 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:58.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:58.545000 audit[3021]: NETFILTER_CFG table=nat:81 family=2 entries=20 op=nft_register_rule pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:58.545000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe960c0780 a2=0 a3=7ffe960c076c items=0 ppid=1657 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:58.545000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:58.611939 kubelet[1439]: E0317 18:47:58.611905 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:47:58.741303 env[1192]: time="2025-03-17T18:47:58.741257882Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:58.742909 env[1192]: time="2025-03-17T18:47:58.742879437Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:58.744309 env[1192]: time="2025-03-17T18:47:58.744277115Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:58.745526 env[1192]: time="2025-03-17T18:47:58.745477689Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:47:58.745875 env[1192]: time="2025-03-17T18:47:58.745849365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Mar 17 18:47:58.747611 env[1192]: time="2025-03-17T18:47:58.747580924Z" level=info msg="CreateContainer within sandbox \"38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Mar 17 18:47:58.761747 env[1192]: time="2025-03-17T18:47:58.761711747Z" level=info msg="CreateContainer within sandbox \"38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3f55d54a8a927903fe1ffceb30683f9a8d7afb0de8fccc1a79a4ca8f3322f867\"" Mar 17 18:47:58.762091 env[1192]: time="2025-03-17T18:47:58.762059485Z" level=info msg="StartContainer for \"3f55d54a8a927903fe1ffceb30683f9a8d7afb0de8fccc1a79a4ca8f3322f867\"" Mar 17 18:47:58.781371 systemd[1]: Started cri-containerd-3f55d54a8a927903fe1ffceb30683f9a8d7afb0de8fccc1a79a4ca8f3322f867.scope. Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1905b3ad88 items=0 ppid=2987 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:58.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353564353461386139323739303366653166666365623330363833 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit: BPF prog-id=128 op=LOAD Mar 17 18:47:58.826000 audit[3029]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009a8d8 items=0 ppid=2987 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:58.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353564353461386139323739303366653166666365623330363833 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit: BPF prog-id=129 op=LOAD Mar 17 18:47:58.826000 audit[3029]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009a928 items=0 ppid=2987 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:58.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353564353461386139323739303366653166666365623330363833 Mar 17 18:47:58.826000 audit: BPF prog-id=129 op=UNLOAD Mar 17 18:47:58.826000 audit: BPF prog-id=128 op=UNLOAD Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:47:58.826000 audit: BPF prog-id=130 op=LOAD Mar 17 18:47:58.826000 audit[3029]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009a9b8 items=0 ppid=2987 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:58.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353564353461386139323739303366653166666365623330363833 Mar 17 18:47:58.838740 env[1192]: time="2025-03-17T18:47:58.838703260Z" level=info msg="StartContainer for \"3f55d54a8a927903fe1ffceb30683f9a8d7afb0de8fccc1a79a4ca8f3322f867\" returns successfully" Mar 17 18:47:58.839940 env[1192]: time="2025-03-17T18:47:58.839894595Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Mar 17 18:47:59.004000 audit[3057]: NETFILTER_CFG table=filter:82 family=2 entries=9 op=nft_register_rule pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:59.004000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffd5511830 a2=0 a3=7fffd551181c items=0 ppid=1657 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:59.004000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:59.008347 systemd[1]: run-containerd-runc-k8s.io-3f55d54a8a927903fe1ffceb30683f9a8d7afb0de8fccc1a79a4ca8f3322f867-runc.rckTnO.mount: Deactivated successfully. Mar 17 18:47:59.014000 audit[3057]: NETFILTER_CFG table=nat:83 family=2 entries=27 op=nft_register_chain pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:47:59.014000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffd5511830 a2=0 a3=7fffd551181c items=0 ppid=1657 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:47:59.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:47:59.612132 kubelet[1439]: E0317 18:47:59.612070 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:00.384732 env[1192]: time="2025-03-17T18:48:00.384651535Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:00.386891 env[1192]: time="2025-03-17T18:48:00.386840888Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:00.388594 env[1192]: time="2025-03-17T18:48:00.388538824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:00.390681 env[1192]: time="2025-03-17T18:48:00.390626109Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:00.391071 env[1192]: time="2025-03-17T18:48:00.391037168Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Mar 17 18:48:00.392855 env[1192]: time="2025-03-17T18:48:00.392826012Z" level=info msg="CreateContainer within sandbox \"38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Mar 17 18:48:00.409519 env[1192]: time="2025-03-17T18:48:00.409472244Z" level=info msg="CreateContainer within sandbox \"38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"c4cd3ed1b2cc7e8b30f20d32d4b9674557de01eaea8b6079a7fb0255344794e0\"" Mar 17 18:48:00.410008 env[1192]: time="2025-03-17T18:48:00.409967028Z" level=info msg="StartContainer for \"c4cd3ed1b2cc7e8b30f20d32d4b9674557de01eaea8b6079a7fb0255344794e0\"" Mar 17 18:48:00.428430 systemd[1]: Started cri-containerd-c4cd3ed1b2cc7e8b30f20d32d4b9674557de01eaea8b6079a7fb0255344794e0.scope. Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb994104608 items=0 ppid=2987 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:00.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334636433656431623263633765386233306632306433326434623936 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit: BPF prog-id=131 op=LOAD Mar 17 18:48:00.441000 audit[3071]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000332ac8 items=0 ppid=2987 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:00.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334636433656431623263633765386233306632306433326434623936 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit: BPF prog-id=132 op=LOAD Mar 17 18:48:00.441000 audit[3071]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000332b18 items=0 ppid=2987 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:00.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334636433656431623263633765386233306632306433326434623936 Mar 17 18:48:00.441000 audit: BPF prog-id=132 op=UNLOAD Mar 17 18:48:00.441000 audit: BPF prog-id=131 op=UNLOAD Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:00.441000 audit: BPF prog-id=133 op=LOAD Mar 17 18:48:00.441000 audit[3071]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000332ba8 items=0 ppid=2987 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:00.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334636433656431623263633765386233306632306433326434623936 Mar 17 18:48:00.455068 env[1192]: time="2025-03-17T18:48:00.455010072Z" level=info msg="StartContainer for \"c4cd3ed1b2cc7e8b30f20d32d4b9674557de01eaea8b6079a7fb0255344794e0\" returns successfully" Mar 17 18:48:00.612797 kubelet[1439]: E0317 18:48:00.612744 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:00.920101 kubelet[1439]: I0317 18:48:00.920064 1439 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Mar 17 18:48:00.920101 kubelet[1439]: I0317 18:48:00.920091 1439 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Mar 17 18:48:01.049958 kubelet[1439]: I0317 18:48:01.049899 1439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-6bp86" podStartSLOduration=50.878596062 podStartE2EDuration="54.049881305s" podCreationTimestamp="2025-03-17 18:47:07 +0000 UTC" firstStartedPulling="2025-03-17 18:47:57.220430407 +0000 UTC m=+50.869699668" lastFinishedPulling="2025-03-17 18:48:00.39171566 +0000 UTC m=+54.040984911" observedRunningTime="2025-03-17 18:48:01.046708384 +0000 UTC m=+54.695977645" watchObservedRunningTime="2025-03-17 18:48:01.049881305 +0000 UTC m=+54.699150566" Mar 17 18:48:01.546000 audit[3103]: NETFILTER_CFG table=filter:84 family=2 entries=8 op=nft_register_rule pid=3103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:01.546000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd6cf31ae0 a2=0 a3=7ffd6cf31acc items=0 ppid=1657 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:01.546000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:01.555000 audit[3103]: NETFILTER_CFG table=nat:85 family=2 entries=30 op=nft_register_rule pid=3103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:01.555000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd6cf31ae0 a2=0 a3=7ffd6cf31acc items=0 ppid=1657 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:01.555000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:01.613485 kubelet[1439]: E0317 18:48:01.613441 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:01.737000 audit[3105]: NETFILTER_CFG table=filter:86 family=2 entries=8 op=nft_register_rule pid=3105 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:01.737000 audit[3105]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffec8c1820 a2=0 a3=7fffec8c180c items=0 ppid=1657 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:01.737000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:01.745000 audit[3105]: NETFILTER_CFG table=nat:87 family=2 entries=34 op=nft_register_chain pid=3105 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:01.745000 audit[3105]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffec8c1820 a2=0 a3=7fffec8c180c items=0 ppid=1657 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:01.745000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:01.936275 env[1192]: time="2025-03-17T18:48:01.936227727Z" level=info msg="StopPodSandbox for \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\"" Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.971 [INFO][3125] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.971 [INFO][3125] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" iface="eth0" netns="/var/run/netns/cni-9f5d5875-219f-77f4-e507-7a089e58c99c" Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.971 [INFO][3125] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" iface="eth0" netns="/var/run/netns/cni-9f5d5875-219f-77f4-e507-7a089e58c99c" Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.971 [INFO][3125] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" iface="eth0" netns="/var/run/netns/cni-9f5d5875-219f-77f4-e507-7a089e58c99c" Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.971 [INFO][3125] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.971 [INFO][3125] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.986 [INFO][3132] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" HandleID="k8s-pod-network.78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.986 [INFO][3132] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.986 [INFO][3132] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.991 [WARNING][3132] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" HandleID="k8s-pod-network.78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.991 [INFO][3132] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" HandleID="k8s-pod-network.78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.993 [INFO][3132] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:48:01.995450 env[1192]: 2025-03-17 18:48:01.994 [INFO][3125] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:01.997300 systemd[1]: run-netns-cni\x2d9f5d5875\x2d219f\x2d77f4\x2de507\x2d7a089e58c99c.mount: Deactivated successfully. Mar 17 18:48:01.997833 env[1192]: time="2025-03-17T18:48:01.997778710Z" level=info msg="TearDown network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\" successfully" Mar 17 18:48:01.997833 env[1192]: time="2025-03-17T18:48:01.997825871Z" level=info msg="StopPodSandbox for \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\" returns successfully" Mar 17 18:48:01.998443 env[1192]: time="2025-03-17T18:48:01.998410478Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-5n94x,Uid:4f14c568-2007-42d6-8fab-a40ed1dd8ab3,Namespace:default,Attempt:1,}" Mar 17 18:48:02.089807 systemd-networkd[1026]: cali46b86d5d460: Link UP Mar 17 18:48:02.092092 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:48:02.092357 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali46b86d5d460: link becomes ready Mar 17 18:48:02.092323 systemd-networkd[1026]: cali46b86d5d460: Gained carrier Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.038 [INFO][3140] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0 nginx-deployment-8587fbcb89- default 4f14c568-2007-42d6-8fab-a40ed1dd8ab3 1306 0 2025-03-17 18:47:23 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.143 nginx-deployment-8587fbcb89-5n94x eth0 default [] [] [kns.default ksa.default.default] cali46b86d5d460 [] []}} ContainerID="f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" Namespace="default" Pod="nginx-deployment-8587fbcb89-5n94x" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.039 [INFO][3140] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" Namespace="default" Pod="nginx-deployment-8587fbcb89-5n94x" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.060 [INFO][3154] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" HandleID="k8s-pod-network.f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.067 [INFO][3154] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" HandleID="k8s-pod-network.f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ddc30), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"nginx-deployment-8587fbcb89-5n94x", "timestamp":"2025-03-17 18:48:02.060449309 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.067 [INFO][3154] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.067 [INFO][3154] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.067 [INFO][3154] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.069 [INFO][3154] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" host="10.0.0.143" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.072 [INFO][3154] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.143" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.075 [INFO][3154] ipam/ipam.go 489: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.076 [INFO][3154] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.078 [INFO][3154] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.078 [INFO][3154] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" host="10.0.0.143" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.079 [INFO][3154] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2 Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.082 [INFO][3154] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" host="10.0.0.143" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.086 [INFO][3154] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.2/26] block=192.168.66.0/26 handle="k8s-pod-network.f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" host="10.0.0.143" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.086 [INFO][3154] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.2/26] handle="k8s-pod-network.f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" host="10.0.0.143" Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.086 [INFO][3154] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:48:02.101597 env[1192]: 2025-03-17 18:48:02.086 [INFO][3154] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.2/26] IPv6=[] ContainerID="f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" HandleID="k8s-pod-network.f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:02.102272 env[1192]: 2025-03-17 18:48:02.087 [INFO][3140] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" Namespace="default" Pod="nginx-deployment-8587fbcb89-5n94x" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"4f14c568-2007-42d6-8fab-a40ed1dd8ab3", ResourceVersion:"1306", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-5n94x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali46b86d5d460", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:02.102272 env[1192]: 2025-03-17 18:48:02.088 [INFO][3140] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.2/32] ContainerID="f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" Namespace="default" Pod="nginx-deployment-8587fbcb89-5n94x" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:02.102272 env[1192]: 2025-03-17 18:48:02.088 [INFO][3140] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali46b86d5d460 ContainerID="f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" Namespace="default" Pod="nginx-deployment-8587fbcb89-5n94x" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:02.102272 env[1192]: 2025-03-17 18:48:02.092 [INFO][3140] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" Namespace="default" Pod="nginx-deployment-8587fbcb89-5n94x" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:02.102272 env[1192]: 2025-03-17 18:48:02.092 [INFO][3140] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" Namespace="default" Pod="nginx-deployment-8587fbcb89-5n94x" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"4f14c568-2007-42d6-8fab-a40ed1dd8ab3", ResourceVersion:"1306", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2", Pod:"nginx-deployment-8587fbcb89-5n94x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali46b86d5d460", MAC:"06:58:48:41:ba:69", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:02.102272 env[1192]: 2025-03-17 18:48:02.099 [INFO][3140] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2" Namespace="default" Pod="nginx-deployment-8587fbcb89-5n94x" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:02.107000 audit[3176]: NETFILTER_CFG table=filter:88 family=2 entries=38 op=nft_register_chain pid=3176 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:48:02.107000 audit[3176]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffd9d4393d0 a2=0 a3=7ffd9d4393bc items=0 ppid=2698 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:02.107000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:48:02.111783 env[1192]: time="2025-03-17T18:48:02.111729199Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:48:02.111867 env[1192]: time="2025-03-17T18:48:02.111800989Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:48:02.111867 env[1192]: time="2025-03-17T18:48:02.111828753Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:48:02.112105 env[1192]: time="2025-03-17T18:48:02.112045013Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2 pid=3184 runtime=io.containerd.runc.v2 Mar 17 18:48:02.125276 systemd[1]: Started cri-containerd-f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2.scope. Mar 17 18:48:02.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit: BPF prog-id=134 op=LOAD Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3184 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:02.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634653139393535633565393234316639383231323538393630646564 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3184 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:02.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634653139393535633565393234316639383231323538393630646564 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit: BPF prog-id=135 op=LOAD Mar 17 18:48:02.133000 audit[3194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00031bd60 items=0 ppid=3184 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:02.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634653139393535633565393234316639383231323538393630646564 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit: BPF prog-id=136 op=LOAD Mar 17 18:48:02.133000 audit[3194]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00031bda8 items=0 ppid=3184 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:02.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634653139393535633565393234316639383231323538393630646564 Mar 17 18:48:02.133000 audit: BPF prog-id=136 op=UNLOAD Mar 17 18:48:02.133000 audit: BPF prog-id=135 op=UNLOAD Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:02.133000 audit: BPF prog-id=137 op=LOAD Mar 17 18:48:02.133000 audit[3194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003861b8 items=0 ppid=3184 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:02.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634653139393535633565393234316639383231323538393630646564 Mar 17 18:48:02.135483 systemd-resolved[1140]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Mar 17 18:48:02.155570 env[1192]: time="2025-03-17T18:48:02.155530661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-5n94x,Uid:4f14c568-2007-42d6-8fab-a40ed1dd8ab3,Namespace:default,Attempt:1,} returns sandbox id \"f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2\"" Mar 17 18:48:02.156856 env[1192]: time="2025-03-17T18:48:02.156832951Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 18:48:02.613900 kubelet[1439]: E0317 18:48:02.613855 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:02.997401 systemd[1]: run-containerd-runc-k8s.io-f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2-runc.t6cdgc.mount: Deactivated successfully. Mar 17 18:48:03.614688 kubelet[1439]: E0317 18:48:03.614635 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:03.990920 systemd-networkd[1026]: cali46b86d5d460: Gained IPv6LL Mar 17 18:48:04.615556 kubelet[1439]: E0317 18:48:04.615494 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:05.152603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2802087115.mount: Deactivated successfully. Mar 17 18:48:05.616569 kubelet[1439]: E0317 18:48:05.616509 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:05.877094 systemd[1]: Created slice kubepods-besteffort-podc8e2c6d1_4975_4e17_9afe_4099ad73896d.slice. Mar 17 18:48:05.907415 kubelet[1439]: I0317 18:48:05.907385 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fg2lw\" (UniqueName: \"kubernetes.io/projected/c8e2c6d1-4975-4e17-9afe-4099ad73896d-kube-api-access-fg2lw\") pod \"calico-kube-controllers-66669b67f8-4q65m\" (UID: \"c8e2c6d1-4975-4e17-9afe-4099ad73896d\") " pod="calico-system/calico-kube-controllers-66669b67f8-4q65m" Mar 17 18:48:05.907415 kubelet[1439]: I0317 18:48:05.907415 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c8e2c6d1-4975-4e17-9afe-4099ad73896d-tigera-ca-bundle\") pod \"calico-kube-controllers-66669b67f8-4q65m\" (UID: \"c8e2c6d1-4975-4e17-9afe-4099ad73896d\") " pod="calico-system/calico-kube-controllers-66669b67f8-4q65m" Mar 17 18:48:06.179766 env[1192]: time="2025-03-17T18:48:06.179724808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66669b67f8-4q65m,Uid:c8e2c6d1-4975-4e17-9afe-4099ad73896d,Namespace:calico-system,Attempt:0,}" Mar 17 18:48:06.583127 kubelet[1439]: E0317 18:48:06.583051 1439 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:06.606352 env[1192]: time="2025-03-17T18:48:06.606316957Z" level=info msg="StopPodSandbox for \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\"" Mar 17 18:48:06.617651 kubelet[1439]: E0317 18:48:06.617629 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.637 [WARNING][3239] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--6bp86-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f62d233-a2bf-4293-97c9-b918fbcd2fee", ResourceVersion:"1292", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 47, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d", Pod:"csi-node-driver-6bp86", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif8b0b6efaa4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.637 [INFO][3239] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.637 [INFO][3239] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" iface="eth0" netns="" Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.637 [INFO][3239] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.637 [INFO][3239] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.654 [INFO][3246] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" HandleID="k8s-pod-network.aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.654 [INFO][3246] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.654 [INFO][3246] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.659 [WARNING][3246] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" HandleID="k8s-pod-network.aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.659 [INFO][3246] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" HandleID="k8s-pod-network.aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.660 [INFO][3246] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:48:06.662510 env[1192]: 2025-03-17 18:48:06.661 [INFO][3239] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:48:06.662929 env[1192]: time="2025-03-17T18:48:06.662536101Z" level=info msg="TearDown network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\" successfully" Mar 17 18:48:06.662929 env[1192]: time="2025-03-17T18:48:06.662572792Z" level=info msg="StopPodSandbox for \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\" returns successfully" Mar 17 18:48:06.663212 env[1192]: time="2025-03-17T18:48:06.663172162Z" level=info msg="RemovePodSandbox for \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\"" Mar 17 18:48:06.663263 env[1192]: time="2025-03-17T18:48:06.663205246Z" level=info msg="Forcibly stopping sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\"" Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.692 [WARNING][3268] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--6bp86-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f62d233-a2bf-4293-97c9-b918fbcd2fee", ResourceVersion:"1292", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 47, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"38d607716d2440e6f15465c3fcc0262e2fdc79b9c75443868d8f58c10e12c99d", Pod:"csi-node-driver-6bp86", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif8b0b6efaa4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.692 [INFO][3268] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.692 [INFO][3268] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" iface="eth0" netns="" Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.692 [INFO][3268] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.692 [INFO][3268] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.708 [INFO][3276] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" HandleID="k8s-pod-network.aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.708 [INFO][3276] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.711 [INFO][3276] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.716 [WARNING][3276] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" HandleID="k8s-pod-network.aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.716 [INFO][3276] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" HandleID="k8s-pod-network.aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Workload="10.0.0.143-k8s-csi--node--driver--6bp86-eth0" Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.717 [INFO][3276] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:48:06.719887 env[1192]: 2025-03-17 18:48:06.718 [INFO][3268] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270" Mar 17 18:48:06.720278 env[1192]: time="2025-03-17T18:48:06.719914340Z" level=info msg="TearDown network for sandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\" successfully" Mar 17 18:48:06.727459 env[1192]: time="2025-03-17T18:48:06.727429979Z" level=info msg="RemovePodSandbox \"aa172f9c7ac2c93cb671cc807aa64ad3329ca0c424fb26e4715e3d2471074270\" returns successfully" Mar 17 18:48:06.727988 env[1192]: time="2025-03-17T18:48:06.727955646Z" level=info msg="StopPodSandbox for \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\"" Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.761 [WARNING][3299] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"4f14c568-2007-42d6-8fab-a40ed1dd8ab3", ResourceVersion:"1309", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2", Pod:"nginx-deployment-8587fbcb89-5n94x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali46b86d5d460", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.762 [INFO][3299] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.762 [INFO][3299] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" iface="eth0" netns="" Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.762 [INFO][3299] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.762 [INFO][3299] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.781 [INFO][3325] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" HandleID="k8s-pod-network.78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.781 [INFO][3325] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.781 [INFO][3325] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.787 [WARNING][3325] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" HandleID="k8s-pod-network.78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.787 [INFO][3325] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" HandleID="k8s-pod-network.78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.789 [INFO][3325] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:48:06.791832 env[1192]: 2025-03-17 18:48:06.790 [INFO][3299] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:06.796780 env[1192]: time="2025-03-17T18:48:06.791856772Z" level=info msg="TearDown network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\" successfully" Mar 17 18:48:06.796780 env[1192]: time="2025-03-17T18:48:06.791895227Z" level=info msg="StopPodSandbox for \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\" returns successfully" Mar 17 18:48:06.796780 env[1192]: time="2025-03-17T18:48:06.792482944Z" level=info msg="RemovePodSandbox for \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\"" Mar 17 18:48:06.796780 env[1192]: time="2025-03-17T18:48:06.792520276Z" level=info msg="Forcibly stopping sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\"" Mar 17 18:48:06.840621 env[1192]: time="2025-03-17T18:48:06.840531753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:06.842740 systemd-networkd[1026]: calic040b3087d1: Link UP Mar 17 18:48:06.845351 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:48:06.845402 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic040b3087d1: link becomes ready Mar 17 18:48:06.845649 systemd-networkd[1026]: calic040b3087d1: Gained carrier Mar 17 18:48:06.846035 env[1192]: time="2025-03-17T18:48:06.846007994Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:06.848684 env[1192]: time="2025-03-17T18:48:06.848641992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:06.851781 env[1192]: time="2025-03-17T18:48:06.851756492Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:06.852294 env[1192]: time="2025-03-17T18:48:06.852151216Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee\"" Mar 17 18:48:06.855140 env[1192]: time="2025-03-17T18:48:06.855112840Z" level=info msg="CreateContainer within sandbox \"f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.773 [INFO][3304] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0 calico-kube-controllers-66669b67f8- calico-system c8e2c6d1-4975-4e17-9afe-4099ad73896d 1345 0 2025-03-17 18:48:05 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:66669b67f8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s 10.0.0.143 calico-kube-controllers-66669b67f8-4q65m eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calic040b3087d1 [] []}} ContainerID="0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" Namespace="calico-system" Pod="calico-kube-controllers-66669b67f8-4q65m" WorkloadEndpoint="10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.773 [INFO][3304] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" Namespace="calico-system" Pod="calico-kube-controllers-66669b67f8-4q65m" WorkloadEndpoint="10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.798 [INFO][3333] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" HandleID="k8s-pod-network.0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" Workload="10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.805 [INFO][3333] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" HandleID="k8s-pod-network.0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" Workload="10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002fc9b0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.143", "pod":"calico-kube-controllers-66669b67f8-4q65m", "timestamp":"2025-03-17 18:48:06.797981299 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.805 [INFO][3333] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.805 [INFO][3333] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.805 [INFO][3333] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.806 [INFO][3333] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" host="10.0.0.143" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.809 [INFO][3333] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.143" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.812 [INFO][3333] ipam/ipam.go 489: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.813 [INFO][3333] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.815 [INFO][3333] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.815 [INFO][3333] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" host="10.0.0.143" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.816 [INFO][3333] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.832 [INFO][3333] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" host="10.0.0.143" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.838 [INFO][3333] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.3/26] block=192.168.66.0/26 handle="k8s-pod-network.0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" host="10.0.0.143" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.838 [INFO][3333] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.3/26] handle="k8s-pod-network.0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" host="10.0.0.143" Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.838 [INFO][3333] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:48:06.856258 env[1192]: 2025-03-17 18:48:06.838 [INFO][3333] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.3/26] IPv6=[] ContainerID="0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" HandleID="k8s-pod-network.0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" Workload="10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0" Mar 17 18:48:06.856785 env[1192]: 2025-03-17 18:48:06.840 [INFO][3304] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" Namespace="calico-system" Pod="calico-kube-controllers-66669b67f8-4q65m" WorkloadEndpoint="10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0", GenerateName:"calico-kube-controllers-66669b67f8-", Namespace:"calico-system", SelfLink:"", UID:"c8e2c6d1-4975-4e17-9afe-4099ad73896d", ResourceVersion:"1345", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 48, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66669b67f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"calico-kube-controllers-66669b67f8-4q65m", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.66.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic040b3087d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:06.856785 env[1192]: 2025-03-17 18:48:06.840 [INFO][3304] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.3/32] ContainerID="0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" Namespace="calico-system" Pod="calico-kube-controllers-66669b67f8-4q65m" WorkloadEndpoint="10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0" Mar 17 18:48:06.856785 env[1192]: 2025-03-17 18:48:06.840 [INFO][3304] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic040b3087d1 ContainerID="0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" Namespace="calico-system" Pod="calico-kube-controllers-66669b67f8-4q65m" WorkloadEndpoint="10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0" Mar 17 18:48:06.856785 env[1192]: 2025-03-17 18:48:06.845 [INFO][3304] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" Namespace="calico-system" Pod="calico-kube-controllers-66669b67f8-4q65m" WorkloadEndpoint="10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0" Mar 17 18:48:06.856785 env[1192]: 2025-03-17 18:48:06.846 [INFO][3304] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" Namespace="calico-system" Pod="calico-kube-controllers-66669b67f8-4q65m" WorkloadEndpoint="10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0", GenerateName:"calico-kube-controllers-66669b67f8-", Namespace:"calico-system", SelfLink:"", UID:"c8e2c6d1-4975-4e17-9afe-4099ad73896d", ResourceVersion:"1345", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 48, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66669b67f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f", Pod:"calico-kube-controllers-66669b67f8-4q65m", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.66.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic040b3087d1", MAC:"6a:df:9c:a4:94:6c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:06.856785 env[1192]: 2025-03-17 18:48:06.853 [INFO][3304] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f" Namespace="calico-system" Pod="calico-kube-controllers-66669b67f8-4q65m" WorkloadEndpoint="10.0.0.143-k8s-calico--kube--controllers--66669b67f8--4q65m-eth0" Mar 17 18:48:06.867875 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount677898959.mount: Deactivated successfully. Mar 17 18:48:06.871697 kernel: kauditd_printk_skb: 220 callbacks suppressed Mar 17 18:48:06.871807 kernel: audit: type=1325 audit(1742237286.868:793): table=filter:89 family=2 entries=38 op=nft_register_chain pid=3384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:48:06.868000 audit[3384]: NETFILTER_CFG table=filter:89 family=2 entries=38 op=nft_register_chain pid=3384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:48:06.872175 env[1192]: time="2025-03-17T18:48:06.872137898Z" level=info msg="CreateContainer within sandbox \"f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"2c4d503e0817d95ed4d62b1c0d98c34eb1890ee10e3267b66ebead35267ff614\"" Mar 17 18:48:06.868000 audit[3384]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffd011329e0 a2=0 a3=7ffd011329cc items=0 ppid=2698 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.875080 env[1192]: time="2025-03-17T18:48:06.875047531Z" level=info msg="StartContainer for \"2c4d503e0817d95ed4d62b1c0d98c34eb1890ee10e3267b66ebead35267ff614\"" Mar 17 18:48:06.879788 kernel: audit: type=1300 audit(1742237286.868:793): arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffd011329e0 a2=0 a3=7ffd011329cc items=0 ppid=2698 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.879868 kernel: audit: type=1327 audit(1742237286.868:793): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:48:06.868000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.835 [WARNING][3360] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"4f14c568-2007-42d6-8fab-a40ed1dd8ab3", ResourceVersion:"1309", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"f4e19955c5e9241f9821258960ded6980811356add29f15eed10eeab5fbb81c2", Pod:"nginx-deployment-8587fbcb89-5n94x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali46b86d5d460", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.835 [INFO][3360] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.835 [INFO][3360] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" iface="eth0" netns="" Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.835 [INFO][3360] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.835 [INFO][3360] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.870 [INFO][3368] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" HandleID="k8s-pod-network.78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.870 [INFO][3368] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.870 [INFO][3368] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.877 [WARNING][3368] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" HandleID="k8s-pod-network.78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.877 [INFO][3368] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" HandleID="k8s-pod-network.78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--5n94x-eth0" Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.879 [INFO][3368] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:48:06.882951 env[1192]: 2025-03-17 18:48:06.881 [INFO][3360] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304" Mar 17 18:48:06.883356 env[1192]: time="2025-03-17T18:48:06.882984917Z" level=info msg="TearDown network for sandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\" successfully" Mar 17 18:48:06.885447 env[1192]: time="2025-03-17T18:48:06.885420382Z" level=info msg="RemovePodSandbox \"78678af9f99bfed75924be148ee22ccd9ff1b765ba4662cd70a389542a2b5304\" returns successfully" Mar 17 18:48:06.885944 env[1192]: time="2025-03-17T18:48:06.885916652Z" level=info msg="StopPodSandbox for \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\"" Mar 17 18:48:06.886110 env[1192]: time="2025-03-17T18:48:06.886065921Z" level=info msg="TearDown network for sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" successfully" Mar 17 18:48:06.886193 env[1192]: time="2025-03-17T18:48:06.886171216Z" level=info msg="StopPodSandbox for \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" returns successfully" Mar 17 18:48:06.886516 env[1192]: time="2025-03-17T18:48:06.886496284Z" level=info msg="RemovePodSandbox for \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\"" Mar 17 18:48:06.886737 env[1192]: time="2025-03-17T18:48:06.886708766Z" level=info msg="Forcibly stopping sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\"" Mar 17 18:48:06.886859 env[1192]: time="2025-03-17T18:48:06.886840190Z" level=info msg="TearDown network for sandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" successfully" Mar 17 18:48:06.889582 env[1192]: time="2025-03-17T18:48:06.889496032Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:48:06.889582 env[1192]: time="2025-03-17T18:48:06.889545798Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:48:06.889582 env[1192]: time="2025-03-17T18:48:06.889561538Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:48:06.889789 env[1192]: time="2025-03-17T18:48:06.889757748Z" level=info msg="RemovePodSandbox \"6b6217a86870552429451e4db8b6085b878bd667ed3f69a8b2bac5462c142ce8\" returns successfully" Mar 17 18:48:06.889910 env[1192]: time="2025-03-17T18:48:06.889788368Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f pid=3413 runtime=io.containerd.runc.v2 Mar 17 18:48:06.891500 systemd[1]: Started cri-containerd-2c4d503e0817d95ed4d62b1c0d98c34eb1890ee10e3267b66ebead35267ff614.scope. Mar 17 18:48:06.899479 systemd[1]: Started cri-containerd-0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f.scope. Mar 17 18:48:06.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.910192 kernel: audit: type=1400 audit(1742237286.902:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.910241 kernel: audit: type=1400 audit(1742237286.902:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.910328 kernel: audit: type=1400 audit(1742237286.902:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.913399 kernel: audit: type=1400 audit(1742237286.902:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.919097 kernel: audit: type=1400 audit(1742237286.902:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.919141 kernel: audit: type=1400 audit(1742237286.902:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit: BPF prog-id=138 op=LOAD Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[3399]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3184 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263346435303365303831376439356564346436326231633064393863 Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[3399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3184 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263346435303365303831376439356564346436326231633064393863 Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.909000 audit: BPF prog-id=139 op=LOAD Mar 17 18:48:06.922672 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Mar 17 18:48:06.909000 audit[3399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00031da40 items=0 ppid=3184 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263346435303365303831376439356564346436326231633064393863 Mar 17 18:48:06.912000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.912000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.912000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.912000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.912000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.912000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.912000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.912000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit: BPF prog-id=140 op=LOAD Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=3413 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061646632623164316563343732316566616161663732636134373732 Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=3413 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061646632623164316563343732316566616161663732636134373732 Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.912000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.912000 audit: BPF prog-id=141 op=LOAD Mar 17 18:48:06.918000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.912000 audit[3399]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00031da88 items=0 ppid=3184 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263346435303365303831376439356564346436326231633064393863 Mar 17 18:48:06.921000 audit: BPF prog-id=141 op=UNLOAD Mar 17 18:48:06.921000 audit: BPF prog-id=139 op=UNLOAD Mar 17 18:48:06.921000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3399]: AVC avc: denied { perfmon } for pid=3399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3399]: AVC avc: denied { bpf } for pid=3399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.918000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000231150 items=0 ppid=3413 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.921000 audit: BPF prog-id=143 op=LOAD Mar 17 18:48:06.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061646632623164316563343732316566616161663732636134373732 Mar 17 18:48:06.921000 audit[3399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00031de98 items=0 ppid=3184 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263346435303365303831376439356564346436326231633064393863 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit: BPF prog-id=144 op=LOAD Mar 17 18:48:06.921000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000231198 items=0 ppid=3413 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061646632623164316563343732316566616161663732636134373732 Mar 17 18:48:06.921000 audit: BPF prog-id=144 op=UNLOAD Mar 17 18:48:06.921000 audit: BPF prog-id=142 op=UNLOAD Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:06.921000 audit: BPF prog-id=145 op=LOAD Mar 17 18:48:06.921000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0002315a8 items=0 ppid=3413 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:06.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061646632623164316563343732316566616161663732636134373732 Mar 17 18:48:06.923970 systemd-resolved[1140]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Mar 17 18:48:06.939720 env[1192]: time="2025-03-17T18:48:06.937017389Z" level=info msg="StartContainer for \"2c4d503e0817d95ed4d62b1c0d98c34eb1890ee10e3267b66ebead35267ff614\" returns successfully" Mar 17 18:48:06.948169 env[1192]: time="2025-03-17T18:48:06.948130292Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66669b67f8-4q65m,Uid:c8e2c6d1-4975-4e17-9afe-4099ad73896d,Namespace:calico-system,Attempt:0,} returns sandbox id \"0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f\"" Mar 17 18:48:06.949809 env[1192]: time="2025-03-17T18:48:06.949742112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Mar 17 18:48:07.618510 kubelet[1439]: E0317 18:48:07.618454 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:08.599390 systemd-networkd[1026]: calic040b3087d1: Gained IPv6LL Mar 17 18:48:08.603000 audit[3496]: NETFILTER_CFG table=filter:90 family=2 entries=8 op=nft_register_rule pid=3496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:08.603000 audit[3496]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffeeecae830 a2=0 a3=7ffeeecae81c items=0 ppid=1657 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:08.603000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:08.607000 audit[3496]: NETFILTER_CFG table=nat:91 family=2 entries=46 op=nft_register_rule pid=3496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:08.607000 audit[3496]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffeeecae830 a2=0 a3=7ffeeecae81c items=0 ppid=1657 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:08.607000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:08.618765 kubelet[1439]: E0317 18:48:08.618736 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:08.620000 audit[3498]: NETFILTER_CFG table=filter:92 family=2 entries=8 op=nft_register_rule pid=3498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:08.620000 audit[3498]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcdfe39b40 a2=0 a3=7ffcdfe39b2c items=0 ppid=1657 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:08.620000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:08.629000 audit[3498]: NETFILTER_CFG table=nat:93 family=2 entries=58 op=nft_register_chain pid=3498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:08.629000 audit[3498]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffcdfe39b40 a2=0 a3=7ffcdfe39b2c items=0 ppid=1657 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:08.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:09.337977 env[1192]: time="2025-03-17T18:48:09.337914955Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:09.339997 env[1192]: time="2025-03-17T18:48:09.339956128Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:09.341607 env[1192]: time="2025-03-17T18:48:09.341576909Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:09.343154 env[1192]: time="2025-03-17T18:48:09.343100933Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:09.343436 env[1192]: time="2025-03-17T18:48:09.343393648Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Mar 17 18:48:09.351535 env[1192]: time="2025-03-17T18:48:09.351499046Z" level=info msg="CreateContainer within sandbox \"0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Mar 17 18:48:09.365598 env[1192]: time="2025-03-17T18:48:09.365560849Z" level=info msg="CreateContainer within sandbox \"0adf2b1d1ec4721efaaaf72ca477239fc9b1302ccda070bf141189577ddb785f\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"6f923971f0a0a929f48f103e6c2fc27a521d0f2607d6c1446a2b4c931b491282\"" Mar 17 18:48:09.365979 env[1192]: time="2025-03-17T18:48:09.365954750Z" level=info msg="StartContainer for \"6f923971f0a0a929f48f103e6c2fc27a521d0f2607d6c1446a2b4c931b491282\"" Mar 17 18:48:09.379571 systemd[1]: Started cri-containerd-6f923971f0a0a929f48f103e6c2fc27a521d0f2607d6c1446a2b4c931b491282.scope. Mar 17 18:48:09.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit: BPF prog-id=146 op=LOAD Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3413 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:09.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666393233393731663061306139323966343866313033653663326663 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3413 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:09.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666393233393731663061306139323966343866313033653663326663 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit: BPF prog-id=147 op=LOAD Mar 17 18:48:09.389000 audit[3508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000092eb0 items=0 ppid=3413 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:09.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666393233393731663061306139323966343866313033653663326663 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit: BPF prog-id=148 op=LOAD Mar 17 18:48:09.389000 audit[3508]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000092ef8 items=0 ppid=3413 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:09.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666393233393731663061306139323966343866313033653663326663 Mar 17 18:48:09.389000 audit: BPF prog-id=148 op=UNLOAD Mar 17 18:48:09.389000 audit: BPF prog-id=147 op=UNLOAD Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { perfmon } for pid=3508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit[3508]: AVC avc: denied { bpf } for pid=3508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:09.389000 audit: BPF prog-id=149 op=LOAD Mar 17 18:48:09.389000 audit[3508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000093308 items=0 ppid=3413 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:09.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666393233393731663061306139323966343866313033653663326663 Mar 17 18:48:09.413886 env[1192]: time="2025-03-17T18:48:09.413845391Z" level=info msg="StartContainer for \"6f923971f0a0a929f48f103e6c2fc27a521d0f2607d6c1446a2b4c931b491282\" returns successfully" Mar 17 18:48:09.619774 kubelet[1439]: E0317 18:48:09.619651 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:10.068373 kubelet[1439]: I0317 18:48:10.068319 1439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-66669b67f8-4q65m" podStartSLOduration=2.673368339 podStartE2EDuration="5.068303948s" podCreationTimestamp="2025-03-17 18:48:05 +0000 UTC" firstStartedPulling="2025-03-17 18:48:06.949309885 +0000 UTC m=+60.598579146" lastFinishedPulling="2025-03-17 18:48:09.344245494 +0000 UTC m=+62.993514755" observedRunningTime="2025-03-17 18:48:10.068262639 +0000 UTC m=+63.717531900" watchObservedRunningTime="2025-03-17 18:48:10.068303948 +0000 UTC m=+63.717573209" Mar 17 18:48:10.068590 kubelet[1439]: I0317 18:48:10.068466 1439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-5n94x" podStartSLOduration=42.371068498 podStartE2EDuration="47.068462124s" podCreationTimestamp="2025-03-17 18:47:23 +0000 UTC" firstStartedPulling="2025-03-17 18:48:02.156430229 +0000 UTC m=+55.805699490" lastFinishedPulling="2025-03-17 18:48:06.853823855 +0000 UTC m=+60.503093116" observedRunningTime="2025-03-17 18:48:07.059315321 +0000 UTC m=+60.708584582" watchObservedRunningTime="2025-03-17 18:48:10.068462124 +0000 UTC m=+63.717731385" Mar 17 18:48:10.620090 kubelet[1439]: E0317 18:48:10.620052 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:11.440000 audit[3558]: NETFILTER_CFG table=filter:94 family=2 entries=20 op=nft_register_rule pid=3558 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:11.440000 audit[3558]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe8bfce8b0 a2=0 a3=7ffe8bfce89c items=0 ppid=1657 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:11.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:11.445000 audit[3558]: NETFILTER_CFG table=nat:95 family=2 entries=22 op=nft_register_rule pid=3558 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:11.445000 audit[3558]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe8bfce8b0 a2=0 a3=0 items=0 ppid=1657 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:11.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:11.457000 audit[3560]: NETFILTER_CFG table=filter:96 family=2 entries=32 op=nft_register_rule pid=3560 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:11.457000 audit[3560]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffda701e010 a2=0 a3=7ffda701dffc items=0 ppid=1657 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:11.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:11.463000 audit[3560]: NETFILTER_CFG table=nat:97 family=2 entries=22 op=nft_register_rule pid=3560 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:11.463000 audit[3560]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffda701e010 a2=0 a3=0 items=0 ppid=1657 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:11.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:11.483152 systemd[1]: Created slice kubepods-besteffort-pod7aaecd05_0065_4697_8792_f78c73bec29b.slice. Mar 17 18:48:11.537694 kubelet[1439]: I0317 18:48:11.537673 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/7aaecd05-0065-4697-8792-f78c73bec29b-data\") pod \"nfs-server-provisioner-0\" (UID: \"7aaecd05-0065-4697-8792-f78c73bec29b\") " pod="default/nfs-server-provisioner-0" Mar 17 18:48:11.537769 kubelet[1439]: I0317 18:48:11.537742 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sqszc\" (UniqueName: \"kubernetes.io/projected/7aaecd05-0065-4697-8792-f78c73bec29b-kube-api-access-sqszc\") pod \"nfs-server-provisioner-0\" (UID: \"7aaecd05-0065-4697-8792-f78c73bec29b\") " pod="default/nfs-server-provisioner-0" Mar 17 18:48:11.620260 kubelet[1439]: E0317 18:48:11.620241 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:11.785467 env[1192]: time="2025-03-17T18:48:11.785370048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:7aaecd05-0065-4697-8792-f78c73bec29b,Namespace:default,Attempt:0,}" Mar 17 18:48:11.888067 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:48:11.888177 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Mar 17 18:48:11.887548 systemd-networkd[1026]: cali60e51b789ff: Link UP Mar 17 18:48:11.888434 systemd-networkd[1026]: cali60e51b789ff: Gained carrier Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.833 [INFO][3562] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 7aaecd05-0065-4697-8792-f78c73bec29b 1432 0 2025-03-17 18:48:11 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.143 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.833 [INFO][3562] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.855 [INFO][3576] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" HandleID="k8s-pod-network.6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.862 [INFO][3576] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" HandleID="k8s-pod-network.6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000434670), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"nfs-server-provisioner-0", "timestamp":"2025-03-17 18:48:11.855652938 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.862 [INFO][3576] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.862 [INFO][3576] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.862 [INFO][3576] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.864 [INFO][3576] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" host="10.0.0.143" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.867 [INFO][3576] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.143" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.870 [INFO][3576] ipam/ipam.go 489: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.872 [INFO][3576] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.874 [INFO][3576] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.874 [INFO][3576] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" host="10.0.0.143" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.875 [INFO][3576] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.878 [INFO][3576] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" host="10.0.0.143" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.882 [INFO][3576] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.4/26] block=192.168.66.0/26 handle="k8s-pod-network.6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" host="10.0.0.143" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.882 [INFO][3576] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.4/26] handle="k8s-pod-network.6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" host="10.0.0.143" Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.882 [INFO][3576] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:48:11.897503 env[1192]: 2025-03-17 18:48:11.882 [INFO][3576] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.4/26] IPv6=[] ContainerID="6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" HandleID="k8s-pod-network.6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:48:11.898051 env[1192]: 2025-03-17 18:48:11.884 [INFO][3562] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"7aaecd05-0065-4697-8792-f78c73bec29b", ResourceVersion:"1432", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:11.898051 env[1192]: 2025-03-17 18:48:11.884 [INFO][3562] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.4/32] ContainerID="6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:48:11.898051 env[1192]: 2025-03-17 18:48:11.884 [INFO][3562] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:48:11.898051 env[1192]: 2025-03-17 18:48:11.888 [INFO][3562] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:48:11.898213 env[1192]: 2025-03-17 18:48:11.888 [INFO][3562] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"7aaecd05-0065-4697-8792-f78c73bec29b", ResourceVersion:"1432", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"3e:57:09:55:8c:88", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:11.898213 env[1192]: 2025-03-17 18:48:11.896 [INFO][3562] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:48:11.912617 kernel: kauditd_printk_skb: 190 callbacks suppressed Mar 17 18:48:11.912815 kernel: audit: type=1325 audit(1742237291.904:856): table=filter:98 family=2 entries=42 op=nft_register_chain pid=3601 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:48:11.912889 kernel: audit: type=1300 audit(1742237291.904:856): arch=c000003e syscall=46 success=yes exit=21008 a0=3 a1=7ffffb55a100 a2=0 a3=7ffffb55a0ec items=0 ppid=2698 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:11.904000 audit[3601]: NETFILTER_CFG table=filter:98 family=2 entries=42 op=nft_register_chain pid=3601 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:48:11.904000 audit[3601]: SYSCALL arch=c000003e syscall=46 success=yes exit=21008 a0=3 a1=7ffffb55a100 a2=0 a3=7ffffb55a0ec items=0 ppid=2698 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:11.913246 env[1192]: time="2025-03-17T18:48:11.907813213Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:48:11.913246 env[1192]: time="2025-03-17T18:48:11.907847359Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:48:11.913246 env[1192]: time="2025-03-17T18:48:11.907857700Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:48:11.913246 env[1192]: time="2025-03-17T18:48:11.908033859Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e pid=3609 runtime=io.containerd.runc.v2 Mar 17 18:48:11.914695 kernel: audit: type=1327 audit(1742237291.904:856): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:48:11.904000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:48:11.926595 systemd[1]: Started cri-containerd-6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e.scope. Mar 17 18:48:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939687 kernel: audit: type=1400 audit(1742237291.935:857): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.946495 kernel: audit: type=1400 audit(1742237291.935:858): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.946580 kernel: audit: type=1400 audit(1742237291.935:859): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.946602 kernel: audit: type=1400 audit(1742237291.935:860): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.952995 kernel: audit: type=1400 audit(1742237291.935:861): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.953054 kernel: audit: type=1400 audit(1742237291.935:862): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.953217 systemd-resolved[1140]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Mar 17 18:48:11.955907 kernel: audit: type=1400 audit(1742237291.935:863): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.938000 audit: BPF prog-id=150 op=LOAD Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3609 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:11.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363330383530323062323666326330613137646261666431333361 Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3609 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:11.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363330383530323062323666326330613137646261666431333361 Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.939000 audit: BPF prog-id=151 op=LOAD Mar 17 18:48:11.939000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e4000 items=0 ppid=3609 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:11.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363330383530323062323666326330613137646261666431333361 Mar 17 18:48:11.942000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.942000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.942000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.942000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.942000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.942000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.942000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.942000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.942000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.942000 audit: BPF prog-id=152 op=LOAD Mar 17 18:48:11.942000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e4048 items=0 ppid=3609 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:11.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363330383530323062323666326330613137646261666431333361 Mar 17 18:48:11.945000 audit: BPF prog-id=152 op=UNLOAD Mar 17 18:48:11.945000 audit: BPF prog-id=151 op=UNLOAD Mar 17 18:48:11.945000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.945000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.945000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.945000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.945000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.945000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.945000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.945000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.945000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.945000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:11.945000 audit: BPF prog-id=153 op=LOAD Mar 17 18:48:11.945000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e4458 items=0 ppid=3609 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:11.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363330383530323062323666326330613137646261666431333361 Mar 17 18:48:11.978937 env[1192]: time="2025-03-17T18:48:11.978899433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:7aaecd05-0065-4697-8792-f78c73bec29b,Namespace:default,Attempt:0,} returns sandbox id \"6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e\"" Mar 17 18:48:11.980781 env[1192]: time="2025-03-17T18:48:11.980699807Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Mar 17 18:48:12.620895 kubelet[1439]: E0317 18:48:12.620852 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:13.143238 systemd-networkd[1026]: cali60e51b789ff: Gained IPv6LL Mar 17 18:48:13.621366 kubelet[1439]: E0317 18:48:13.621310 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:14.592276 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1965110728.mount: Deactivated successfully. Mar 17 18:48:14.622464 kubelet[1439]: E0317 18:48:14.622402 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:15.623407 kubelet[1439]: E0317 18:48:15.623357 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:16.624485 kubelet[1439]: E0317 18:48:16.624420 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:16.956859 env[1192]: time="2025-03-17T18:48:16.956815466Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:16.958956 env[1192]: time="2025-03-17T18:48:16.958923152Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:16.961270 env[1192]: time="2025-03-17T18:48:16.961235543Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:16.963887 env[1192]: time="2025-03-17T18:48:16.963853471Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:16.964475 env[1192]: time="2025-03-17T18:48:16.964446091Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Mar 17 18:48:16.966549 env[1192]: time="2025-03-17T18:48:16.966522678Z" level=info msg="CreateContainer within sandbox \"6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Mar 17 18:48:16.976716 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3599528660.mount: Deactivated successfully. Mar 17 18:48:16.978755 env[1192]: time="2025-03-17T18:48:16.978725765Z" level=info msg="CreateContainer within sandbox \"6363085020b26f2c0a17dbafd133a9217c60650fef6f98f234f1eea5966a7e0e\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"8a887410157b79fa8e6180754d046bc106ae4a8fdb6bee77c2624e1ae8c9f1b6\"" Mar 17 18:48:16.979087 env[1192]: time="2025-03-17T18:48:16.979055579Z" level=info msg="StartContainer for \"8a887410157b79fa8e6180754d046bc106ae4a8fdb6bee77c2624e1ae8c9f1b6\"" Mar 17 18:48:16.995917 systemd[1]: Started cri-containerd-8a887410157b79fa8e6180754d046bc106ae4a8fdb6bee77c2624e1ae8c9f1b6.scope. Mar 17 18:48:17.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.017967 kernel: kauditd_printk_skb: 50 callbacks suppressed Mar 17 18:48:17.018021 kernel: audit: type=1400 audit(1742237297.016:875): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.023629 kernel: audit: type=1400 audit(1742237297.016:876): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.023675 kernel: audit: type=1400 audit(1742237297.016:877): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.029343 kernel: audit: type=1400 audit(1742237297.016:878): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.029383 kernel: audit: type=1400 audit(1742237297.016:879): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.032229 kernel: audit: type=1400 audit(1742237297.016:880): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.035102 kernel: audit: type=1400 audit(1742237297.016:881): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.037960 kernel: audit: type=1400 audit(1742237297.016:882): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.043680 kernel: audit: type=1400 audit(1742237297.016:883): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.043718 kernel: audit: type=1400 audit(1742237297.020:884): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit: BPF prog-id=154 op=LOAD Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3609 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:17.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861383837343130313537623739666138653631383037353464303436 Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3609 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:17.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861383837343130313537623739666138653631383037353464303436 Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.020000 audit: BPF prog-id=155 op=LOAD Mar 17 18:48:17.020000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028cd80 items=0 ppid=3609 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:17.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861383837343130313537623739666138653631383037353464303436 Mar 17 18:48:17.028000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.028000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.028000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.028000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.028000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.028000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.028000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.028000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.028000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.028000 audit: BPF prog-id=156 op=LOAD Mar 17 18:48:17.028000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028cdc8 items=0 ppid=3609 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:17.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861383837343130313537623739666138653631383037353464303436 Mar 17 18:48:17.031000 audit: BPF prog-id=156 op=UNLOAD Mar 17 18:48:17.031000 audit: BPF prog-id=155 op=UNLOAD Mar 17 18:48:17.031000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.031000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.031000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.031000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.031000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.031000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.031000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.031000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.031000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.031000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:17.031000 audit: BPF prog-id=157 op=LOAD Mar 17 18:48:17.031000 audit[3661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028d1d8 items=0 ppid=3609 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:17.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861383837343130313537623739666138653631383037353464303436 Mar 17 18:48:17.092000 audit[3690]: AVC avc: denied { search } for pid=3690 comm="rpcbind" name="crypto" dev="proc" ino=22515 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c884 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:48:17.092000 audit[3690]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f43ecd600c0 a2=0 a3=0 items=0 ppid=3671 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c884 key=(null) Mar 17 18:48:17.092000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Mar 17 18:48:17.110071 env[1192]: time="2025-03-17T18:48:17.110023866Z" level=info msg="StartContainer for \"8a887410157b79fa8e6180754d046bc106ae4a8fdb6bee77c2624e1ae8c9f1b6\" returns successfully" Mar 17 18:48:17.119958 kubelet[1439]: I0317 18:48:17.119890 1439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.134583147 podStartE2EDuration="6.119872042s" podCreationTimestamp="2025-03-17 18:48:11 +0000 UTC" firstStartedPulling="2025-03-17 18:48:11.980251553 +0000 UTC m=+65.629520814" lastFinishedPulling="2025-03-17 18:48:16.965540458 +0000 UTC m=+70.614809709" observedRunningTime="2025-03-17 18:48:17.119385245 +0000 UTC m=+70.768654506" watchObservedRunningTime="2025-03-17 18:48:17.119872042 +0000 UTC m=+70.769141293" Mar 17 18:48:17.122000 audit[3695]: AVC avc: denied { search } for pid=3695 comm="dbus-daemon" name="crypto" dev="proc" ino=22515 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c884 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:48:17.122000 audit[3695]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4071a7b0c0 a2=0 a3=0 items=0 ppid=3671 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c884 key=(null) Mar 17 18:48:17.122000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 18:48:17.124000 audit[3697]: AVC avc: denied { watch } for pid=3697 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538930 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c884 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c279,c884 tclass=dir permissive=0 Mar 17 18:48:17.124000 audit[3697]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=560300de76b0 a2=2c8 a3=7ffd0d6b50cc items=0 ppid=3671 pid=3697 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c884 key=(null) Mar 17 18:48:17.124000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 18:48:17.127000 audit[3698]: AVC avc: denied { read } for pid=3698 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25263 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c884 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Mar 17 18:48:17.127000 audit[3698]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f3190f01320 a1=80000 a2=d a3=7ffe59660180 items=0 ppid=3671 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c884 key=(null) Mar 17 18:48:17.127000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 18:48:17.128000 audit[3699]: NETFILTER_CFG table=filter:99 family=2 entries=20 op=nft_register_rule pid=3699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:17.128000 audit[3699]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd2d5be420 a2=0 a3=7ffd2d5be40c items=0 ppid=1657 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:17.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:17.128000 audit[3698]: AVC avc: denied { search } for pid=3698 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22515 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c884 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:48:17.128000 audit[3698]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f31904550c0 a2=0 a3=0 items=0 ppid=3671 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c884 key=(null) Mar 17 18:48:17.128000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 18:48:17.134000 audit[3699]: NETFILTER_CFG table=nat:100 family=2 entries=106 op=nft_register_chain pid=3699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:48:17.134000 audit[3699]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd2d5be420 a2=0 a3=7ffd2d5be40c items=0 ppid=1657 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:17.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:48:17.625294 kubelet[1439]: E0317 18:48:17.625251 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:17.974348 systemd[1]: run-containerd-runc-k8s.io-8a887410157b79fa8e6180754d046bc106ae4a8fdb6bee77c2624e1ae8c9f1b6-runc.uY5upG.mount: Deactivated successfully. Mar 17 18:48:18.625563 kubelet[1439]: E0317 18:48:18.625531 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:19.626523 kubelet[1439]: E0317 18:48:19.626488 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:20.627438 kubelet[1439]: E0317 18:48:20.627395 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:21.051895 kubelet[1439]: E0317 18:48:21.051866 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:48:21.627889 kubelet[1439]: E0317 18:48:21.627854 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:22.628757 kubelet[1439]: E0317 18:48:22.628710 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:22.936606 kubelet[1439]: E0317 18:48:22.936562 1439 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Mar 17 18:48:23.629558 kubelet[1439]: E0317 18:48:23.629503 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:24.630474 kubelet[1439]: E0317 18:48:24.630440 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:25.631207 kubelet[1439]: E0317 18:48:25.631171 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:26.582466 kubelet[1439]: E0317 18:48:26.582417 1439 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:26.632179 kubelet[1439]: E0317 18:48:26.632133 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:26.870270 systemd[1]: Created slice kubepods-besteffort-pod82fae163_9f62_4287_a168_b115242f84ef.slice. Mar 17 18:48:26.916892 kubelet[1439]: I0317 18:48:26.916867 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4sspq\" (UniqueName: \"kubernetes.io/projected/82fae163-9f62-4287-a168-b115242f84ef-kube-api-access-4sspq\") pod \"test-pod-1\" (UID: \"82fae163-9f62-4287-a168-b115242f84ef\") " pod="default/test-pod-1" Mar 17 18:48:26.917005 kubelet[1439]: I0317 18:48:26.916895 1439 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-93e1a688-a053-413f-b874-676fd0c8af09\" (UniqueName: \"kubernetes.io/nfs/82fae163-9f62-4287-a168-b115242f84ef-pvc-93e1a688-a053-413f-b874-676fd0c8af09\") pod \"test-pod-1\" (UID: \"82fae163-9f62-4287-a168-b115242f84ef\") " pod="default/test-pod-1" Mar 17 18:48:27.026000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.030060 kernel: Failed to create system directory netfs Mar 17 18:48:27.030105 kernel: kauditd_printk_skb: 68 callbacks suppressed Mar 17 18:48:27.030122 kernel: audit: type=1400 audit(1742237307.026:900): avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.030143 kernel: Failed to create system directory netfs Mar 17 18:48:27.030939 kernel: audit: type=1400 audit(1742237307.026:900): avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.026000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.026000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.043151 kernel: Failed to create system directory netfs Mar 17 18:48:27.043185 kernel: audit: type=1400 audit(1742237307.026:900): avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.043203 kernel: Failed to create system directory netfs Mar 17 18:48:27.043221 kernel: audit: type=1400 audit(1742237307.026:900): avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.026000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.026000 audit[3769]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562d2e5a25e0 a1=153bc a2=562cf6bd12b0 a3=5 items=0 ppid=498 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:27.026000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:48:27.054908 kernel: audit: type=1300 audit(1742237307.026:900): arch=c000003e syscall=175 success=yes exit=0 a0=562d2e5a25e0 a1=153bc a2=562cf6bd12b0 a3=5 items=0 ppid=498 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:27.054969 kernel: audit: type=1327 audit(1742237307.026:900): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:48:27.054991 kernel: Failed to create system directory fscache Mar 17 18:48:27.055006 kernel: audit: type=1400 audit(1742237307.050:901): avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.055799 kernel: Failed to create system directory fscache Mar 17 18:48:27.055830 kernel: Failed to create system directory fscache Mar 17 18:48:27.055843 kernel: Failed to create system directory fscache Mar 17 18:48:27.055861 kernel: Failed to create system directory fscache Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.060683 kernel: audit: type=1400 audit(1742237307.050:901): avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.063018 kernel: Failed to create system directory fscache Mar 17 18:48:27.063050 kernel: audit: type=1400 audit(1742237307.050:901): avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.063069 kernel: Failed to create system directory fscache Mar 17 18:48:27.063082 kernel: Failed to create system directory fscache Mar 17 18:48:27.066535 kernel: audit: type=1400 audit(1742237307.050:901): avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.067323 kernel: Failed to create system directory fscache Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.077458 kernel: Failed to create system directory fscache Mar 17 18:48:27.077488 kernel: Failed to create system directory fscache Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.078261 kernel: Failed to create system directory fscache Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.079871 kernel: Failed to create system directory fscache Mar 17 18:48:27.079909 kernel: Failed to create system directory fscache Mar 17 18:48:27.050000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.050000 audit[3769]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562d2e7b79c0 a1=4c0fc a2=562cf6bd12b0 a3=5 items=0 ppid=498 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:27.050000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:48:27.082685 kernel: FS-Cache: Loaded Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.111960 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.111987 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.112001 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.112690 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.114106 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.114124 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.116269 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.116305 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.116327 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.117717 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.117742 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.119152 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.119184 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.121821 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.121871 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.121889 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.124224 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.124245 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.124265 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.125693 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.125762 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.127175 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.127216 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.129323 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.129350 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.129375 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.130777 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.130799 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.132201 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.132224 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.134367 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.134399 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.134414 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.135831 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.135868 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.137316 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.137389 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.138783 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.138805 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.140220 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.140243 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.142373 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.142395 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.142410 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.143818 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.143836 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.145244 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.145261 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.146774 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.146796 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.148211 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.148234 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.150369 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.150393 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.150410 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.151813 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.151836 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.153239 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.153256 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.154738 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.154767 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.156190 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.156223 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.158335 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.158368 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.158385 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.159787 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.159805 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.161211 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.161235 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.163377 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.163400 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.163413 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.164821 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.164842 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.166266 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.166304 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.169671 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.169702 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.169725 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.169741 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.171277 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.171317 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.171342 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.172718 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.172740 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.174144 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.174181 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.176305 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.176363 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.176392 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.177017 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.179164 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.179194 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.179208 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.181327 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.181364 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.181380 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.182770 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.182813 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.184198 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.184221 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.186377 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.186417 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.186438 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.187091 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.187821 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.189241 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.189273 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.190686 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.190717 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.192119 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.192148 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.194303 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.194330 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.194344 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.195784 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.195813 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.197208 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.197236 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.199349 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.199380 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.199392 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.200844 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.200870 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.100000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.202264 kernel: Failed to create system directory sunrpc Mar 17 18:48:27.212217 kernel: RPC: Registered named UNIX socket transport module. Mar 17 18:48:27.212265 kernel: RPC: Registered udp transport module. Mar 17 18:48:27.212281 kernel: RPC: Registered tcp transport module. Mar 17 18:48:27.212956 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 17 18:48:27.100000 audit[3769]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562d2e803ad0 a1=1a810c a2=562cf6bd12b0 a3=5 items=6 ppid=498 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:27.100000 audit: CWD cwd="/" Mar 17 18:48:27.100000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:27.100000 audit: PATH item=1 name=(null) inode=26737 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:27.100000 audit: PATH item=2 name=(null) inode=26737 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:27.100000 audit: PATH item=3 name=(null) inode=26738 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:27.100000 audit: PATH item=4 name=(null) inode=26737 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:27.100000 audit: PATH item=5 name=(null) inode=26739 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:27.100000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.247264 kernel: Failed to create system directory nfs Mar 17 18:48:27.247297 kernel: Failed to create system directory nfs Mar 17 18:48:27.247318 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.249308 kernel: Failed to create system directory nfs Mar 17 18:48:27.249343 kernel: Failed to create system directory nfs Mar 17 18:48:27.249369 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.250691 kernel: Failed to create system directory nfs Mar 17 18:48:27.250726 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.252044 kernel: Failed to create system directory nfs Mar 17 18:48:27.252061 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.254088 kernel: Failed to create system directory nfs Mar 17 18:48:27.254108 kernel: Failed to create system directory nfs Mar 17 18:48:27.254122 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.256154 kernel: Failed to create system directory nfs Mar 17 18:48:27.256195 kernel: Failed to create system directory nfs Mar 17 18:48:27.256213 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.258195 kernel: Failed to create system directory nfs Mar 17 18:48:27.258215 kernel: Failed to create system directory nfs Mar 17 18:48:27.258234 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.260242 kernel: Failed to create system directory nfs Mar 17 18:48:27.260261 kernel: Failed to create system directory nfs Mar 17 18:48:27.260281 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.262282 kernel: Failed to create system directory nfs Mar 17 18:48:27.262299 kernel: Failed to create system directory nfs Mar 17 18:48:27.262313 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.263001 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.264332 kernel: Failed to create system directory nfs Mar 17 18:48:27.264420 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.265032 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.267093 kernel: Failed to create system directory nfs Mar 17 18:48:27.267135 kernel: Failed to create system directory nfs Mar 17 18:48:27.267158 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.269133 kernel: Failed to create system directory nfs Mar 17 18:48:27.269180 kernel: Failed to create system directory nfs Mar 17 18:48:27.269205 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.271172 kernel: Failed to create system directory nfs Mar 17 18:48:27.271205 kernel: Failed to create system directory nfs Mar 17 18:48:27.271219 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.273220 kernel: Failed to create system directory nfs Mar 17 18:48:27.273242 kernel: Failed to create system directory nfs Mar 17 18:48:27.273255 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.275277 kernel: Failed to create system directory nfs Mar 17 18:48:27.275309 kernel: Failed to create system directory nfs Mar 17 18:48:27.275328 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.275981 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.278161 kernel: Failed to create system directory nfs Mar 17 18:48:27.278186 kernel: Failed to create system directory nfs Mar 17 18:48:27.278200 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.280226 kernel: Failed to create system directory nfs Mar 17 18:48:27.280272 kernel: Failed to create system directory nfs Mar 17 18:48:27.280292 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.282275 kernel: Failed to create system directory nfs Mar 17 18:48:27.282305 kernel: Failed to create system directory nfs Mar 17 18:48:27.282329 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.283701 kernel: Failed to create system directory nfs Mar 17 18:48:27.283740 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.285034 kernel: Failed to create system directory nfs Mar 17 18:48:27.285092 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.285736 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.238000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.287082 kernel: Failed to create system directory nfs Mar 17 18:48:27.238000 audit[3769]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562d2ea249b0 a1=16ea84 a2=562cf6bd12b0 a3=5 items=0 ppid=498 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:27.238000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:48:27.308685 kernel: FS-Cache: Netfs 'nfs' registered for caching Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.346858 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.346911 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.346928 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.348461 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.348478 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.349981 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.350008 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.352145 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.352168 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.352182 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.353823 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.353841 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.356370 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.356401 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.356422 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.357831 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.357863 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.359261 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.360087 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.360116 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.362250 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.362285 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.362306 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.363800 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.363824 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.365304 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.366134 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.366174 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.368326 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.368346 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.368369 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.369783 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.371199 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.371237 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.371261 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.372969 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.372999 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.375835 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.375889 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.378403 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.378492 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.380399 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.380438 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.381976 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.382012 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.384452 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.384471 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.384496 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.386033 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.386062 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.388189 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.388215 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.388230 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.390339 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.390386 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.390404 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.391789 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.391810 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.393201 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.393224 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.395337 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.395395 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.395419 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.397016 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.397056 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.398775 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.400317 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.400341 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.400363 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.401847 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.402718 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.404419 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.404455 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.404469 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.405988 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.406026 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.408310 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.408343 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.408367 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.409977 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.410784 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.412395 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.412415 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.412428 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.414048 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.414069 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.416283 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.416323 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.416338 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.417770 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.417795 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.419185 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.419209 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.333000 audit[3774]: AVC avc: denied { confidentiality } for pid=3774 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.420698 kernel: Failed to create system directory nfs4 Mar 17 18:48:27.567103 kernel: NFS: Registering the id_resolver key type Mar 17 18:48:27.567141 kernel: Key type id_resolver registered Mar 17 18:48:27.567155 kernel: Key type id_legacy registered Mar 17 18:48:27.333000 audit[3774]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f36a9d85010 a1=208d7c a2=55ba409a92b0 a3=5 items=0 ppid=498 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:27.333000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.579224 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.579246 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.579260 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.580688 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.580712 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.582115 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.582139 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.584263 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.584281 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.584295 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.585715 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.585747 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.587140 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.587163 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.589301 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.589327 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.589341 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.590766 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.590846 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.592199 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.592223 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.594365 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.594389 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.594403 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.595819 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.595851 kernel: Failed to create system directory rpcgss Mar 17 18:48:27.574000 audit[3775]: AVC avc: denied { confidentiality } for pid=3775 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:48:27.574000 audit[3775]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7f275c1010 a1=70b4c a2=557f52dde2b0 a3=5 items=0 ppid=498 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:27.574000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Mar 17 18:48:27.607985 nfsidmap[3783]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Mar 17 18:48:27.610532 nfsidmap[3786]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Mar 17 18:48:27.616000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2989 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:48:27.616000 audit[1267]: AVC avc: denied { watch_reads } for pid=1267 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2989 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:48:27.616000 audit[1267]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5589bc074fd0 a2=10 a3=a427978a0c6a9672 items=0 ppid=1 pid=1267 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:27.616000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:48:27.616000 audit[1267]: AVC avc: denied { watch_reads } for pid=1267 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2989 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:48:27.616000 audit[1267]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5589bc074fd0 a2=10 a3=a427978a0c6a9672 items=0 ppid=1 pid=1267 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:27.616000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:48:27.616000 audit[1267]: AVC avc: denied { watch_reads } for pid=1267 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2989 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:48:27.616000 audit[1267]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5589bc074fd0 a2=10 a3=a427978a0c6a9672 items=0 ppid=1 pid=1267 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:27.616000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:48:27.616000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2989 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:48:27.616000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2989 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:48:27.632936 kubelet[1439]: E0317 18:48:27.632855 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:27.772925 env[1192]: time="2025-03-17T18:48:27.772878720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:82fae163-9f62-4287-a168-b115242f84ef,Namespace:default,Attempt:0,}" Mar 17 18:48:27.964691 systemd-networkd[1026]: cali5ec59c6bf6e: Link UP Mar 17 18:48:27.966837 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:48:27.966939 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Mar 17 18:48:27.967298 systemd-networkd[1026]: cali5ec59c6bf6e: Gained carrier Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.815 [INFO][3789] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-test--pod--1-eth0 default 82fae163-9f62-4287-a168-b115242f84ef 1501 0 2025-03-17 18:48:11 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.143 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.816 [INFO][3789] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.838 [INFO][3802] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" HandleID="k8s-pod-network.5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" Workload="10.0.0.143-k8s-test--pod--1-eth0" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.845 [INFO][3802] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" HandleID="k8s-pod-network.5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" Workload="10.0.0.143-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030a080), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"test-pod-1", "timestamp":"2025-03-17 18:48:27.838291961 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.845 [INFO][3802] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.845 [INFO][3802] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.845 [INFO][3802] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.847 [INFO][3802] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" host="10.0.0.143" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.944 [INFO][3802] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.143" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.948 [INFO][3802] ipam/ipam.go 489: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.949 [INFO][3802] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.951 [INFO][3802] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.951 [INFO][3802] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" host="10.0.0.143" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.952 [INFO][3802] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813 Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.956 [INFO][3802] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" host="10.0.0.143" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.961 [INFO][3802] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.5/26] block=192.168.66.0/26 handle="k8s-pod-network.5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" host="10.0.0.143" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.961 [INFO][3802] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.5/26] handle="k8s-pod-network.5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" host="10.0.0.143" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.961 [INFO][3802] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.961 [INFO][3802] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.5/26] IPv6=[] ContainerID="5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" HandleID="k8s-pod-network.5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" Workload="10.0.0.143-k8s-test--pod--1-eth0" Mar 17 18:48:27.977612 env[1192]: 2025-03-17 18:48:27.962 [INFO][3789] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"82fae163-9f62-4287-a168-b115242f84ef", ResourceVersion:"1501", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:27.978321 env[1192]: 2025-03-17 18:48:27.962 [INFO][3789] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.5/32] ContainerID="5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Mar 17 18:48:27.978321 env[1192]: 2025-03-17 18:48:27.962 [INFO][3789] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Mar 17 18:48:27.978321 env[1192]: 2025-03-17 18:48:27.967 [INFO][3789] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Mar 17 18:48:27.978321 env[1192]: 2025-03-17 18:48:27.967 [INFO][3789] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"82fae163-9f62-4287-a168-b115242f84ef", ResourceVersion:"1501", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"2a:39:b1:90:c7:09", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:48:27.978321 env[1192]: 2025-03-17 18:48:27.973 [INFO][3789] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Mar 17 18:48:27.981000 audit[3824]: NETFILTER_CFG table=filter:101 family=2 entries=42 op=nft_register_chain pid=3824 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:48:27.981000 audit[3824]: SYSCALL arch=c000003e syscall=46 success=yes exit=20588 a0=3 a1=7ffc0d622e10 a2=0 a3=7ffc0d622dfc items=0 ppid=2698 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:27.981000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:48:27.990688 env[1192]: time="2025-03-17T18:48:27.990601040Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:48:27.990688 env[1192]: time="2025-03-17T18:48:27.990637390Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:48:27.990688 env[1192]: time="2025-03-17T18:48:27.990648642Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:48:27.990893 env[1192]: time="2025-03-17T18:48:27.990834719Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813 pid=3832 runtime=io.containerd.runc.v2 Mar 17 18:48:28.001081 systemd[1]: Started cri-containerd-5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813.scope. Mar 17 18:48:28.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit: BPF prog-id=158 op=LOAD Mar 17 18:48:28.009000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3832 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663433333762343165613332326332336530313231323137373231 Mar 17 18:48:28.009000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.009000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3832 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663433333762343165613332326332336530313231323137373231 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit: BPF prog-id=159 op=LOAD Mar 17 18:48:28.010000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031da10 items=0 ppid=3832 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663433333762343165613332326332336530313231323137373231 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit: BPF prog-id=160 op=LOAD Mar 17 18:48:28.010000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031da58 items=0 ppid=3832 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663433333762343165613332326332336530313231323137373231 Mar 17 18:48:28.010000 audit: BPF prog-id=160 op=UNLOAD Mar 17 18:48:28.010000 audit: BPF prog-id=159 op=UNLOAD Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.010000 audit: BPF prog-id=161 op=LOAD Mar 17 18:48:28.010000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031de68 items=0 ppid=3832 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663433333762343165613332326332336530313231323137373231 Mar 17 18:48:28.012741 systemd-resolved[1140]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Mar 17 18:48:28.035145 env[1192]: time="2025-03-17T18:48:28.035092745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:82fae163-9f62-4287-a168-b115242f84ef,Namespace:default,Attempt:0,} returns sandbox id \"5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813\"" Mar 17 18:48:28.036853 env[1192]: time="2025-03-17T18:48:28.036800530Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 18:48:28.465738 env[1192]: time="2025-03-17T18:48:28.465700011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:28.467501 env[1192]: time="2025-03-17T18:48:28.467461079Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:28.469463 env[1192]: time="2025-03-17T18:48:28.469408985Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:28.470975 env[1192]: time="2025-03-17T18:48:28.470929401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:48:28.471533 env[1192]: time="2025-03-17T18:48:28.471500686Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee\"" Mar 17 18:48:28.473407 env[1192]: time="2025-03-17T18:48:28.473364832Z" level=info msg="CreateContainer within sandbox \"5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813\" for container &ContainerMetadata{Name:test,Attempt:0,}" Mar 17 18:48:28.485784 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1258133054.mount: Deactivated successfully. Mar 17 18:48:28.486706 env[1192]: time="2025-03-17T18:48:28.486655903Z" level=info msg="CreateContainer within sandbox \"5bf4337b41ea322c23e012121772187a9aec1bac93d357a555ef8ccb985d2813\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"be4241783c76c1ba29dc62b893bb2cf4d0dd94c8a63fb9a2261b74867d45c1bd\"" Mar 17 18:48:28.486989 env[1192]: time="2025-03-17T18:48:28.486951510Z" level=info msg="StartContainer for \"be4241783c76c1ba29dc62b893bb2cf4d0dd94c8a63fb9a2261b74867d45c1bd\"" Mar 17 18:48:28.502296 systemd[1]: Started cri-containerd-be4241783c76c1ba29dc62b893bb2cf4d0dd94c8a63fb9a2261b74867d45c1bd.scope. Mar 17 18:48:28.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.511000 audit: BPF prog-id=162 op=LOAD Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3832 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265343234313738336337366331626132396463363262383933626232 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3832 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265343234313738336337366331626132396463363262383933626232 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit: BPF prog-id=163 op=LOAD Mar 17 18:48:28.512000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024ba0 items=0 ppid=3832 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265343234313738336337366331626132396463363262383933626232 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit: BPF prog-id=164 op=LOAD Mar 17 18:48:28.512000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024be8 items=0 ppid=3832 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265343234313738336337366331626132396463363262383933626232 Mar 17 18:48:28.512000 audit: BPF prog-id=164 op=UNLOAD Mar 17 18:48:28.512000 audit: BPF prog-id=163 op=UNLOAD Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:48:28.512000 audit: BPF prog-id=165 op=LOAD Mar 17 18:48:28.512000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024ff8 items=0 ppid=3832 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:28.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265343234313738336337366331626132396463363262383933626232 Mar 17 18:48:28.530679 env[1192]: time="2025-03-17T18:48:28.530615101Z" level=info msg="StartContainer for \"be4241783c76c1ba29dc62b893bb2cf4d0dd94c8a63fb9a2261b74867d45c1bd\" returns successfully" Mar 17 18:48:28.634010 kubelet[1439]: E0317 18:48:28.633951 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:29.025893 systemd[1]: run-containerd-runc-k8s.io-be4241783c76c1ba29dc62b893bb2cf4d0dd94c8a63fb9a2261b74867d45c1bd-runc.70ipgV.mount: Deactivated successfully. Mar 17 18:48:29.138637 kubelet[1439]: I0317 18:48:29.138559 1439 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=17.702453862 podStartE2EDuration="18.138541559s" podCreationTimestamp="2025-03-17 18:48:11 +0000 UTC" firstStartedPulling="2025-03-17 18:48:28.036236699 +0000 UTC m=+81.685505960" lastFinishedPulling="2025-03-17 18:48:28.472324406 +0000 UTC m=+82.121593657" observedRunningTime="2025-03-17 18:48:29.138420918 +0000 UTC m=+82.787690179" watchObservedRunningTime="2025-03-17 18:48:29.138541559 +0000 UTC m=+82.787810820" Mar 17 18:48:29.634230 kubelet[1439]: E0317 18:48:29.634194 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:29.718803 systemd-networkd[1026]: cali5ec59c6bf6e: Gained IPv6LL Mar 17 18:48:30.635166 kubelet[1439]: E0317 18:48:30.635136 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:31.635259 kubelet[1439]: E0317 18:48:31.635226 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:32.635677 kubelet[1439]: E0317 18:48:32.635641 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:33.636070 kubelet[1439]: E0317 18:48:33.636028 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:48:34.637140 kubelet[1439]: E0317 18:48:34.637078 1439 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"