Dec 13 15:57:45.895943 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 15:57:45.895969 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:57:45.895982 kernel: BIOS-provided physical RAM map: Dec 13 15:57:45.895989 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 15:57:45.895996 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 15:57:45.896002 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 15:57:45.896011 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Dec 13 15:57:45.896018 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Dec 13 15:57:45.896025 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 15:57:45.896032 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 15:57:45.896041 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 15:57:45.896048 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 15:57:45.896055 kernel: NX (Execute Disable) protection: active Dec 13 15:57:45.896062 kernel: SMBIOS 2.8 present. Dec 13 15:57:45.896072 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Dec 13 15:57:45.896080 kernel: Hypervisor detected: KVM Dec 13 15:57:45.896089 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 15:57:45.896097 kernel: kvm-clock: cpu 0, msr 2d19a001, primary cpu clock Dec 13 15:57:45.896105 kernel: kvm-clock: using sched offset of 4128352253 cycles Dec 13 15:57:45.896113 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 15:57:45.896121 kernel: tsc: Detected 2294.576 MHz processor Dec 13 15:57:45.896129 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 15:57:45.896137 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 15:57:45.896145 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Dec 13 15:57:45.896153 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 15:57:45.896163 kernel: Using GB pages for direct mapping Dec 13 15:57:45.896171 kernel: ACPI: Early table checksum verification disabled Dec 13 15:57:45.896179 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 13 15:57:45.896187 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:57:45.896195 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:57:45.896202 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:57:45.896210 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Dec 13 15:57:45.896218 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:57:45.896226 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:57:45.896235 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:57:45.896243 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:57:45.896251 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Dec 13 15:57:45.896259 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Dec 13 15:57:45.896267 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Dec 13 15:57:45.896275 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Dec 13 15:57:45.896286 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Dec 13 15:57:45.896297 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Dec 13 15:57:45.896312 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Dec 13 15:57:45.896320 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 15:57:45.896329 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 15:57:45.896337 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 15:57:45.896345 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Dec 13 15:57:45.896354 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 15:57:45.896364 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Dec 13 15:57:45.896373 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 15:57:45.896381 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Dec 13 15:57:45.896390 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 15:57:45.896398 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Dec 13 15:57:45.896406 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 15:57:45.896415 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Dec 13 15:57:45.896423 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 15:57:45.896431 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Dec 13 15:57:45.896440 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 15:57:45.896450 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Dec 13 15:57:45.896458 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 15:57:45.896467 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 15:57:45.896475 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Dec 13 15:57:45.896484 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Dec 13 15:57:45.896492 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Dec 13 15:57:45.896501 kernel: Zone ranges: Dec 13 15:57:45.896519 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 15:57:45.896527 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Dec 13 15:57:45.898552 kernel: Normal empty Dec 13 15:57:45.898563 kernel: Movable zone start for each node Dec 13 15:57:45.898572 kernel: Early memory node ranges Dec 13 15:57:45.898581 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 15:57:45.898590 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Dec 13 15:57:45.898599 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Dec 13 15:57:45.898608 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 15:57:45.898616 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 15:57:45.898625 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Dec 13 15:57:45.898636 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 15:57:45.898644 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 15:57:45.898653 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 15:57:45.898662 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 15:57:45.898670 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 15:57:45.898679 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 15:57:45.898687 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 15:57:45.898696 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 15:57:45.898705 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 15:57:45.898715 kernel: TSC deadline timer available Dec 13 15:57:45.898724 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Dec 13 15:57:45.898733 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 15:57:45.898741 kernel: Booting paravirtualized kernel on KVM Dec 13 15:57:45.898750 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 15:57:45.898759 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 15:57:45.898767 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 15:57:45.898776 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 15:57:45.898785 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 15:57:45.898795 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Dec 13 15:57:45.898804 kernel: kvm-guest: PV spinlocks enabled Dec 13 15:57:45.898812 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 15:57:45.898821 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Dec 13 15:57:45.898829 kernel: Policy zone: DMA32 Dec 13 15:57:45.898839 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:57:45.898849 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 15:57:45.898857 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 15:57:45.898868 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 15:57:45.898876 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 15:57:45.898885 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 192524K reserved, 0K cma-reserved) Dec 13 15:57:45.898894 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 15:57:45.898903 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 15:57:45.898911 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 15:57:45.898920 kernel: rcu: Hierarchical RCU implementation. Dec 13 15:57:45.898929 kernel: rcu: RCU event tracing is enabled. Dec 13 15:57:45.898942 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 15:57:45.898967 kernel: Rude variant of Tasks RCU enabled. Dec 13 15:57:45.898984 kernel: Tracing variant of Tasks RCU enabled. Dec 13 15:57:45.898993 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 15:57:45.899001 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 15:57:45.899010 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Dec 13 15:57:45.899018 kernel: random: crng init done Dec 13 15:57:45.899027 kernel: Console: colour VGA+ 80x25 Dec 13 15:57:45.899047 kernel: printk: console [tty0] enabled Dec 13 15:57:45.899056 kernel: printk: console [ttyS0] enabled Dec 13 15:57:45.899065 kernel: ACPI: Core revision 20210730 Dec 13 15:57:45.899074 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 15:57:45.899083 kernel: x2apic enabled Dec 13 15:57:45.899095 kernel: Switched APIC routing to physical x2apic. Dec 13 15:57:45.899104 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2113312ac93, max_idle_ns: 440795244843 ns Dec 13 15:57:45.899113 kernel: Calibrating delay loop (skipped) preset value.. 4589.15 BogoMIPS (lpj=2294576) Dec 13 15:57:45.899126 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 15:57:45.899141 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 15:57:45.899153 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 15:57:45.899162 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 15:57:45.899171 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 15:57:45.899180 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 15:57:45.899190 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 15:57:45.899198 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 15:57:45.899207 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 15:57:45.899216 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 15:57:45.899225 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 15:57:45.899234 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 15:57:45.899245 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 15:57:45.899254 kernel: TAA: Mitigation: Clear CPU buffers Dec 13 15:57:45.899263 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 15:57:45.899272 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 15:57:45.899281 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 15:57:45.899290 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 15:57:45.899299 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 15:57:45.899314 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 15:57:45.899323 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 15:57:45.899332 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 15:57:45.899342 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Dec 13 15:57:45.899353 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 15:57:45.899362 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 15:57:45.899371 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 15:57:45.899380 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 15:57:45.899389 kernel: x86/fpu: xstate_offset[9]: 2432, xstate_sizes[9]: 8 Dec 13 15:57:45.899398 kernel: x86/fpu: Enabled xstate features 0x2e7, context size is 2440 bytes, using 'compacted' format. Dec 13 15:57:45.899407 kernel: Freeing SMP alternatives memory: 32K Dec 13 15:57:45.899415 kernel: pid_max: default: 32768 minimum: 301 Dec 13 15:57:45.899424 kernel: LSM: Security Framework initializing Dec 13 15:57:45.899433 kernel: SELinux: Initializing. Dec 13 15:57:45.899442 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 15:57:45.899452 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 15:57:45.899463 kernel: smpboot: CPU0: Intel Xeon Processor (Cascadelake) (family: 0x6, model: 0x55, stepping: 0x6) Dec 13 15:57:45.899472 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 15:57:45.899481 kernel: signal: max sigframe size: 3632 Dec 13 15:57:45.899490 kernel: rcu: Hierarchical SRCU implementation. Dec 13 15:57:45.899500 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 15:57:45.900535 kernel: smp: Bringing up secondary CPUs ... Dec 13 15:57:45.900548 kernel: x86: Booting SMP configuration: Dec 13 15:57:45.900558 kernel: .... node #0, CPUs: #1 Dec 13 15:57:45.900567 kernel: kvm-clock: cpu 1, msr 2d19a041, secondary cpu clock Dec 13 15:57:45.900580 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 15:57:45.900589 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Dec 13 15:57:45.900599 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 15:57:45.900608 kernel: smpboot: Max logical packages: 16 Dec 13 15:57:45.900617 kernel: smpboot: Total of 2 processors activated (9178.30 BogoMIPS) Dec 13 15:57:45.900626 kernel: devtmpfs: initialized Dec 13 15:57:45.900635 kernel: x86/mm: Memory block size: 128MB Dec 13 15:57:45.900645 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 15:57:45.900654 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 15:57:45.900665 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 15:57:45.900675 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 15:57:45.900684 kernel: audit: initializing netlink subsys (disabled) Dec 13 15:57:45.900693 kernel: audit: type=2000 audit(1734105464.868:1): state=initialized audit_enabled=0 res=1 Dec 13 15:57:45.900702 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 15:57:45.900711 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 15:57:45.900720 kernel: cpuidle: using governor menu Dec 13 15:57:45.900729 kernel: ACPI: bus type PCI registered Dec 13 15:57:45.900738 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 15:57:45.900748 kernel: dca service started, version 1.12.1 Dec 13 15:57:45.900759 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 15:57:45.900768 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 15:57:45.900777 kernel: PCI: Using configuration type 1 for base access Dec 13 15:57:45.900786 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 15:57:45.900796 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 15:57:45.900805 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 15:57:45.900814 kernel: ACPI: Added _OSI(Module Device) Dec 13 15:57:45.900823 kernel: ACPI: Added _OSI(Processor Device) Dec 13 15:57:45.900832 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 15:57:45.900843 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 15:57:45.900852 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 15:57:45.900862 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 15:57:45.900871 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 15:57:45.900880 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 15:57:45.900889 kernel: ACPI: Interpreter enabled Dec 13 15:57:45.900898 kernel: ACPI: PM: (supports S0 S5) Dec 13 15:57:45.900907 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 15:57:45.900916 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 15:57:45.900928 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 15:57:45.900937 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 15:57:45.901095 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 15:57:45.901184 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 15:57:45.901267 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 15:57:45.901279 kernel: PCI host bridge to bus 0000:00 Dec 13 15:57:45.901369 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 15:57:45.901449 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 15:57:45.901542 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 15:57:45.901616 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Dec 13 15:57:45.901688 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 15:57:45.901759 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Dec 13 15:57:45.901831 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 15:57:45.901927 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 15:57:45.902023 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Dec 13 15:57:45.902108 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Dec 13 15:57:45.902197 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Dec 13 15:57:45.902281 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Dec 13 15:57:45.902375 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 15:57:45.902466 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Dec 13 15:57:45.902559 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Dec 13 15:57:45.902654 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Dec 13 15:57:45.902739 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Dec 13 15:57:45.902828 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Dec 13 15:57:45.902912 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Dec 13 15:57:45.903006 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Dec 13 15:57:45.903093 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Dec 13 15:57:45.903190 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Dec 13 15:57:45.903274 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Dec 13 15:57:45.903368 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Dec 13 15:57:45.903452 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Dec 13 15:57:45.903547 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Dec 13 15:57:45.903635 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Dec 13 15:57:45.903723 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Dec 13 15:57:45.903812 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Dec 13 15:57:45.903900 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 15:57:45.903982 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 15:57:45.904068 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Dec 13 15:57:45.904153 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Dec 13 15:57:45.904237 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Dec 13 15:57:45.904332 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 15:57:45.904421 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 15:57:45.904503 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Dec 13 15:57:45.908709 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Dec 13 15:57:45.908802 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 15:57:45.908886 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 15:57:45.908979 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 15:57:45.909061 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Dec 13 15:57:45.909144 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Dec 13 15:57:45.909235 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 15:57:45.909324 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 15:57:45.909418 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Dec 13 15:57:45.909527 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Dec 13 15:57:45.909613 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 15:57:45.909703 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 15:57:45.909786 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:57:45.909878 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 15:57:45.909978 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Dec 13 15:57:45.910072 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Dec 13 15:57:45.910157 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 15:57:45.910241 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 15:57:45.910338 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Dec 13 15:57:45.910424 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Dec 13 15:57:45.914527 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 15:57:45.914661 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 15:57:45.914758 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:57:45.914856 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Dec 13 15:57:45.914947 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Dec 13 15:57:45.915034 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 15:57:45.915118 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 15:57:45.915200 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:57:45.915282 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 15:57:45.915374 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 15:57:45.915458 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:57:45.915550 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 15:57:45.915631 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 15:57:45.915712 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:57:45.915801 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 15:57:45.915883 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 15:57:45.915966 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:57:45.916049 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 15:57:45.916135 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 15:57:45.916218 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:57:45.916308 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 15:57:45.916391 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 15:57:45.916480 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:57:45.916492 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 15:57:45.916502 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 15:57:45.916518 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 15:57:45.916530 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 15:57:45.916540 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 15:57:45.916549 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 15:57:45.916558 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 15:57:45.916567 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 15:57:45.916576 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 15:57:45.916585 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 15:57:45.916594 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 15:57:45.916604 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 15:57:45.916615 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 15:57:45.916624 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 15:57:45.916633 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 15:57:45.916643 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 15:57:45.916652 kernel: iommu: Default domain type: Translated Dec 13 15:57:45.916661 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 15:57:45.916744 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 15:57:45.916827 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 15:57:45.916911 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 15:57:45.916923 kernel: vgaarb: loaded Dec 13 15:57:45.916932 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 15:57:45.916942 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 15:57:45.916951 kernel: PTP clock support registered Dec 13 15:57:45.916960 kernel: PCI: Using ACPI for IRQ routing Dec 13 15:57:45.916970 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 15:57:45.916979 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 15:57:45.916988 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Dec 13 15:57:45.916999 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 15:57:45.917009 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 15:57:45.917018 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 15:57:45.917027 kernel: pnp: PnP ACPI init Dec 13 15:57:45.917120 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 15:57:45.917134 kernel: pnp: PnP ACPI: found 5 devices Dec 13 15:57:45.917143 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 15:57:45.917153 kernel: NET: Registered PF_INET protocol family Dec 13 15:57:45.917165 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 15:57:45.917174 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 15:57:45.917183 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 15:57:45.917192 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 15:57:45.917201 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 15:57:45.917211 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 15:57:45.917220 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 15:57:45.917229 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 15:57:45.917238 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 15:57:45.917250 kernel: NET: Registered PF_XDP protocol family Dec 13 15:57:45.917343 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Dec 13 15:57:45.917428 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Dec 13 15:57:45.917522 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Dec 13 15:57:45.917607 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Dec 13 15:57:45.917697 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 15:57:45.917780 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 15:57:45.917866 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 15:57:45.917949 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 15:57:45.918032 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Dec 13 15:57:45.918114 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Dec 13 15:57:45.918196 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Dec 13 15:57:45.918278 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Dec 13 15:57:45.918385 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Dec 13 15:57:45.918476 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Dec 13 15:57:45.919668 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Dec 13 15:57:45.919765 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Dec 13 15:57:45.919855 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 15:57:45.919941 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 15:57:45.920025 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 15:57:45.920108 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Dec 13 15:57:45.920194 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 15:57:45.920277 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:57:45.920372 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 15:57:45.920454 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Dec 13 15:57:45.921661 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 15:57:45.921762 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:57:45.921854 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 15:57:45.921937 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Dec 13 15:57:45.922022 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 15:57:45.922105 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:57:45.922188 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 15:57:45.922269 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Dec 13 15:57:45.922361 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 15:57:45.922443 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:57:45.923573 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 15:57:45.923677 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Dec 13 15:57:45.923763 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 15:57:45.923847 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:57:45.923930 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 15:57:45.924013 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Dec 13 15:57:45.924095 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 15:57:45.924177 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:57:45.924259 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 15:57:45.924354 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Dec 13 15:57:45.924436 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 15:57:45.924525 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:57:45.924609 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 15:57:45.924691 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Dec 13 15:57:45.924774 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 15:57:45.924860 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:57:45.924949 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 15:57:45.925018 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 15:57:45.925084 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 15:57:45.925171 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Dec 13 15:57:45.925245 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 15:57:45.925325 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Dec 13 15:57:45.925413 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Dec 13 15:57:45.925499 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Dec 13 15:57:45.927631 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:57:45.927725 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Dec 13 15:57:45.927818 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Dec 13 15:57:45.927899 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Dec 13 15:57:45.927976 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:57:45.928061 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Dec 13 15:57:45.928142 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Dec 13 15:57:45.928219 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:57:45.928311 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Dec 13 15:57:45.928391 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Dec 13 15:57:45.928468 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:57:45.929595 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Dec 13 15:57:45.929692 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Dec 13 15:57:45.929773 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:57:45.929865 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Dec 13 15:57:45.929945 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Dec 13 15:57:45.930023 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:57:45.930107 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Dec 13 15:57:45.930186 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Dec 13 15:57:45.930266 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:57:45.930359 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Dec 13 15:57:45.930438 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Dec 13 15:57:45.930526 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:57:45.930540 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 15:57:45.930550 kernel: PCI: CLS 0 bytes, default 64 Dec 13 15:57:45.930560 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 15:57:45.930570 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Dec 13 15:57:45.930584 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 15:57:45.930594 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2113312ac93, max_idle_ns: 440795244843 ns Dec 13 15:57:45.930603 kernel: Initialise system trusted keyrings Dec 13 15:57:45.930614 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 15:57:45.930624 kernel: Key type asymmetric registered Dec 13 15:57:45.930633 kernel: Asymmetric key parser 'x509' registered Dec 13 15:57:45.930643 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 15:57:45.930653 kernel: io scheduler mq-deadline registered Dec 13 15:57:45.930663 kernel: io scheduler kyber registered Dec 13 15:57:45.930675 kernel: io scheduler bfq registered Dec 13 15:57:45.930764 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Dec 13 15:57:45.930851 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Dec 13 15:57:45.930936 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:57:45.931021 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Dec 13 15:57:45.931104 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Dec 13 15:57:45.931189 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:57:45.931276 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Dec 13 15:57:45.931368 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Dec 13 15:57:45.931451 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:57:45.931543 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Dec 13 15:57:45.931626 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Dec 13 15:57:45.931710 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:57:45.931797 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Dec 13 15:57:45.931880 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Dec 13 15:57:45.931963 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:57:45.932046 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Dec 13 15:57:45.932128 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Dec 13 15:57:45.932211 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:57:45.932300 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Dec 13 15:57:45.932390 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Dec 13 15:57:45.932473 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:57:45.932564 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Dec 13 15:57:45.932648 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Dec 13 15:57:45.932731 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:57:45.932747 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 15:57:45.932758 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 15:57:45.932767 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 15:57:45.932777 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 15:57:45.932787 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 15:57:45.932800 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 15:57:45.932810 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 15:57:45.932819 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 15:57:45.932832 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 15:57:45.932915 kernel: rtc_cmos 00:03: RTC can wake from S4 Dec 13 15:57:45.932995 kernel: rtc_cmos 00:03: registered as rtc0 Dec 13 15:57:45.933072 kernel: rtc_cmos 00:03: setting system clock to 2024-12-13T15:57:45 UTC (1734105465) Dec 13 15:57:45.933148 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Dec 13 15:57:45.933160 kernel: intel_pstate: CPU model not supported Dec 13 15:57:45.933170 kernel: NET: Registered PF_INET6 protocol family Dec 13 15:57:45.933183 kernel: Segment Routing with IPv6 Dec 13 15:57:45.933193 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 15:57:45.933202 kernel: NET: Registered PF_PACKET protocol family Dec 13 15:57:45.933212 kernel: Key type dns_resolver registered Dec 13 15:57:45.933222 kernel: IPI shorthand broadcast: enabled Dec 13 15:57:45.933232 kernel: sched_clock: Marking stable (743170637, 118456231)->(1080767650, -219140782) Dec 13 15:57:45.933242 kernel: registered taskstats version 1 Dec 13 15:57:45.933252 kernel: Loading compiled-in X.509 certificates Dec 13 15:57:45.933262 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 15:57:45.933272 kernel: Key type .fscrypt registered Dec 13 15:57:45.933284 kernel: Key type fscrypt-provisioning registered Dec 13 15:57:45.933294 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 15:57:45.933309 kernel: ima: Allocated hash algorithm: sha1 Dec 13 15:57:45.933319 kernel: ima: No architecture policies found Dec 13 15:57:45.933329 kernel: clk: Disabling unused clocks Dec 13 15:57:45.933339 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 15:57:45.933349 kernel: Write protecting the kernel read-only data: 28672k Dec 13 15:57:45.933359 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 15:57:45.933371 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 15:57:45.933381 kernel: Run /init as init process Dec 13 15:57:45.933391 kernel: with arguments: Dec 13 15:57:45.933401 kernel: /init Dec 13 15:57:45.933411 kernel: with environment: Dec 13 15:57:45.933420 kernel: HOME=/ Dec 13 15:57:45.933430 kernel: TERM=linux Dec 13 15:57:45.933439 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 15:57:45.933452 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:57:45.933468 systemd[1]: Detected virtualization kvm. Dec 13 15:57:45.933478 systemd[1]: Detected architecture x86-64. Dec 13 15:57:45.933488 systemd[1]: Running in initrd. Dec 13 15:57:45.933499 systemd[1]: No hostname configured, using default hostname. Dec 13 15:57:45.933514 systemd[1]: Hostname set to . Dec 13 15:57:45.933525 systemd[1]: Initializing machine ID from VM UUID. Dec 13 15:57:45.933535 systemd[1]: Queued start job for default target initrd.target. Dec 13 15:57:45.933545 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:57:45.933558 systemd[1]: Reached target cryptsetup.target. Dec 13 15:57:45.933568 systemd[1]: Reached target paths.target. Dec 13 15:57:45.933578 systemd[1]: Reached target slices.target. Dec 13 15:57:45.933588 systemd[1]: Reached target swap.target. Dec 13 15:57:45.933598 systemd[1]: Reached target timers.target. Dec 13 15:57:45.933609 systemd[1]: Listening on iscsid.socket. Dec 13 15:57:45.933619 systemd[1]: Listening on iscsiuio.socket. Dec 13 15:57:45.933632 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 15:57:45.933642 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 15:57:45.933652 systemd[1]: Listening on systemd-journald.socket. Dec 13 15:57:45.933662 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:57:45.933673 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:57:45.933683 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:57:45.933693 systemd[1]: Reached target sockets.target. Dec 13 15:57:45.933706 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:57:45.933716 systemd[1]: Finished network-cleanup.service. Dec 13 15:57:45.933729 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 15:57:45.933739 systemd[1]: Starting systemd-journald.service... Dec 13 15:57:45.933749 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:57:45.933759 systemd[1]: Starting systemd-resolved.service... Dec 13 15:57:45.933770 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 15:57:45.933780 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:57:45.933790 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 15:57:45.933806 systemd-journald[200]: Journal started Dec 13 15:57:45.933862 systemd-journald[200]: Runtime Journal (/run/log/journal/72bcb7a83269455da82b898c191da497) is 4.7M, max 38.1M, 33.3M free. Dec 13 15:57:45.899155 systemd-modules-load[201]: Inserted module 'overlay' Dec 13 15:57:45.962851 systemd[1]: Started systemd-journald.service. Dec 13 15:57:45.962900 kernel: audit: type=1130 audit(1734105465.943:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:45.962923 kernel: audit: type=1130 audit(1734105465.944:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:45.962942 kernel: audit: type=1130 audit(1734105465.945:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:45.962961 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 15:57:45.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:45.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:45.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:45.923167 systemd-resolved[202]: Positive Trust Anchors: Dec 13 15:57:45.923178 systemd-resolved[202]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:57:45.968369 kernel: audit: type=1130 audit(1734105465.963:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:45.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:45.923214 systemd-resolved[202]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:57:45.973768 kernel: audit: type=1130 audit(1734105465.968:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:45.973792 kernel: Bridge firewalling registered Dec 13 15:57:45.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:45.929462 systemd-resolved[202]: Defaulting to hostname 'linux'. Dec 13 15:57:45.945323 systemd[1]: Started systemd-resolved.service. Dec 13 15:57:45.945707 systemd[1]: Reached target nss-lookup.target. Dec 13 15:57:45.946767 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:57:45.963905 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 15:57:45.964502 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:57:45.969630 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 15:57:45.969893 systemd-modules-load[201]: Inserted module 'br_netfilter' Dec 13 15:57:45.991316 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 15:57:45.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:45.992621 systemd[1]: Starting dracut-cmdline.service... Dec 13 15:57:45.996820 kernel: audit: type=1130 audit(1734105465.991:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:46.000541 kernel: SCSI subsystem initialized Dec 13 15:57:46.005564 dracut-cmdline[217]: dracut-dracut-053 Dec 13 15:57:46.008708 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:57:46.024286 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 15:57:46.024338 kernel: device-mapper: uevent: version 1.0.3 Dec 13 15:57:46.024353 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 15:57:46.023588 systemd-modules-load[201]: Inserted module 'dm_multipath' Dec 13 15:57:46.024219 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:57:46.028645 kernel: audit: type=1130 audit(1734105466.024:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:46.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:46.025818 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:57:46.038501 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:57:46.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:46.042535 kernel: audit: type=1130 audit(1734105466.038:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:46.116543 kernel: Loading iSCSI transport class v2.0-870. Dec 13 15:57:46.135800 kernel: iscsi: registered transport (tcp) Dec 13 15:57:46.160760 kernel: iscsi: registered transport (qla4xxx) Dec 13 15:57:46.160869 kernel: QLogic iSCSI HBA Driver Dec 13 15:57:46.242227 systemd[1]: Finished dracut-cmdline.service. Dec 13 15:57:46.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:46.249548 kernel: audit: type=1130 audit(1734105466.242:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:46.245694 systemd[1]: Starting dracut-pre-udev.service... Dec 13 15:57:46.305582 kernel: raid6: avx512x4 gen() 17811 MB/s Dec 13 15:57:46.322571 kernel: raid6: avx512x4 xor() 7781 MB/s Dec 13 15:57:46.339566 kernel: raid6: avx512x2 gen() 17687 MB/s Dec 13 15:57:46.356586 kernel: raid6: avx512x2 xor() 21459 MB/s Dec 13 15:57:46.373589 kernel: raid6: avx512x1 gen() 17707 MB/s Dec 13 15:57:46.390650 kernel: raid6: avx512x1 xor() 19635 MB/s Dec 13 15:57:46.407593 kernel: raid6: avx2x4 gen() 17323 MB/s Dec 13 15:57:46.424579 kernel: raid6: avx2x4 xor() 7300 MB/s Dec 13 15:57:46.441591 kernel: raid6: avx2x2 gen() 17449 MB/s Dec 13 15:57:46.458633 kernel: raid6: avx2x2 xor() 16319 MB/s Dec 13 15:57:46.475577 kernel: raid6: avx2x1 gen() 13769 MB/s Dec 13 15:57:46.492580 kernel: raid6: avx2x1 xor() 14119 MB/s Dec 13 15:57:46.509587 kernel: raid6: sse2x4 gen() 8181 MB/s Dec 13 15:57:46.526584 kernel: raid6: sse2x4 xor() 5310 MB/s Dec 13 15:57:46.543577 kernel: raid6: sse2x2 gen() 9014 MB/s Dec 13 15:57:46.560583 kernel: raid6: sse2x2 xor() 5219 MB/s Dec 13 15:57:46.577593 kernel: raid6: sse2x1 gen() 8248 MB/s Dec 13 15:57:46.595159 kernel: raid6: sse2x1 xor() 4145 MB/s Dec 13 15:57:46.595276 kernel: raid6: using algorithm avx512x4 gen() 17811 MB/s Dec 13 15:57:46.595314 kernel: raid6: .... xor() 7781 MB/s, rmw enabled Dec 13 15:57:46.595880 kernel: raid6: using avx512x2 recovery algorithm Dec 13 15:57:46.610563 kernel: xor: automatically using best checksumming function avx Dec 13 15:57:46.714558 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 15:57:46.731075 systemd[1]: Finished dracut-pre-udev.service. Dec 13 15:57:46.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:46.731000 audit: BPF prog-id=7 op=LOAD Dec 13 15:57:46.731000 audit: BPF prog-id=8 op=LOAD Dec 13 15:57:46.732651 systemd[1]: Starting systemd-udevd.service... Dec 13 15:57:46.747961 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 15:57:46.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:46.753371 systemd[1]: Started systemd-udevd.service. Dec 13 15:57:46.756164 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 15:57:46.771160 dracut-pre-trigger[411]: rd.md=0: removing MD RAID activation Dec 13 15:57:46.813803 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 15:57:46.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:46.815684 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:57:46.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:46.876226 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:57:46.939529 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Dec 13 15:57:46.957858 kernel: ACPI: bus type USB registered Dec 13 15:57:46.957878 kernel: usbcore: registered new interface driver usbfs Dec 13 15:57:46.957890 kernel: usbcore: registered new interface driver hub Dec 13 15:57:46.957902 kernel: usbcore: registered new device driver usb Dec 13 15:57:46.957914 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 15:57:46.957926 kernel: GPT:17805311 != 125829119 Dec 13 15:57:46.957937 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 15:57:46.957949 kernel: GPT:17805311 != 125829119 Dec 13 15:57:46.957960 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 15:57:46.957975 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:57:46.964519 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 15:57:46.988523 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 15:57:46.988579 kernel: AES CTR mode by8 optimization enabled Dec 13 15:57:46.993525 kernel: libata version 3.00 loaded. Dec 13 15:57:47.005526 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (456) Dec 13 15:57:47.007511 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 15:57:47.046280 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 15:57:47.078730 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 15:57:47.078752 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 15:57:47.078866 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 15:57:47.078961 kernel: scsi host0: ahci Dec 13 15:57:47.079074 kernel: scsi host1: ahci Dec 13 15:57:47.079175 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 15:57:47.079292 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Dec 13 15:57:47.079389 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Dec 13 15:57:47.079485 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 15:57:47.079601 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Dec 13 15:57:47.079694 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Dec 13 15:57:47.079787 kernel: hub 1-0:1.0: USB hub found Dec 13 15:57:47.079900 kernel: hub 1-0:1.0: 4 ports detected Dec 13 15:57:47.080006 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Dec 13 15:57:47.080182 kernel: hub 2-0:1.0: USB hub found Dec 13 15:57:47.080310 kernel: hub 2-0:1.0: 4 ports detected Dec 13 15:57:47.080414 kernel: scsi host2: ahci Dec 13 15:57:47.080540 kernel: scsi host3: ahci Dec 13 15:57:47.080638 kernel: scsi host4: ahci Dec 13 15:57:47.080741 kernel: scsi host5: ahci Dec 13 15:57:47.080838 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 35 Dec 13 15:57:47.080852 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 35 Dec 13 15:57:47.080864 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 35 Dec 13 15:57:47.080876 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 35 Dec 13 15:57:47.080889 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 35 Dec 13 15:57:47.080901 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 35 Dec 13 15:57:47.080913 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:57:47.046817 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 15:57:47.053099 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 15:57:47.057651 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 15:57:47.082985 disk-uuid[510]: Primary Header is updated. Dec 13 15:57:47.082985 disk-uuid[510]: Secondary Entries is updated. Dec 13 15:57:47.082985 disk-uuid[510]: Secondary Header is updated. Dec 13 15:57:47.064102 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:57:47.067817 systemd[1]: Starting disk-uuid.service... Dec 13 15:57:47.088527 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:57:47.296535 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Dec 13 15:57:47.392606 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 15:57:47.392728 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 15:57:47.397654 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 15:57:47.397744 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 15:57:47.400350 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 15:57:47.403611 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 15:57:47.434528 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 15:57:47.439717 kernel: usbcore: registered new interface driver usbhid Dec 13 15:57:47.439752 kernel: usbhid: USB HID core driver Dec 13 15:57:47.445604 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Dec 13 15:57:47.445636 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Dec 13 15:57:48.089550 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:57:48.090281 disk-uuid[516]: The operation has completed successfully. Dec 13 15:57:48.133739 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 15:57:48.133829 systemd[1]: Finished disk-uuid.service. Dec 13 15:57:48.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.138286 systemd[1]: Starting verity-setup.service... Dec 13 15:57:48.155530 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 15:57:48.209287 systemd[1]: Found device dev-mapper-usr.device. Dec 13 15:57:48.210781 systemd[1]: Finished verity-setup.service. Dec 13 15:57:48.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.212707 systemd[1]: Mounting sysusr-usr.mount... Dec 13 15:57:48.296620 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 15:57:48.297894 systemd[1]: Mounted sysusr-usr.mount. Dec 13 15:57:48.315683 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:57:48.315708 kernel: BTRFS info (device vda6): using free space tree Dec 13 15:57:48.315728 kernel: BTRFS info (device vda6): has skinny extents Dec 13 15:57:48.298465 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 15:57:48.299423 systemd[1]: Starting ignition-setup.service... Dec 13 15:57:48.316807 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 15:57:48.335706 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 15:57:48.341931 systemd[1]: Finished ignition-setup.service. Dec 13 15:57:48.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.343278 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 15:57:48.473733 ignition[618]: Ignition 2.14.0 Dec 13 15:57:48.473761 ignition[618]: Stage: fetch-offline Dec 13 15:57:48.473911 ignition[618]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:57:48.473939 ignition[618]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:57:48.475264 ignition[618]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:57:48.477790 ignition[618]: parsed url from cmdline: "" Dec 13 15:57:48.477798 ignition[618]: no config URL provided Dec 13 15:57:48.477807 ignition[618]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:57:48.477818 ignition[618]: no config at "/usr/lib/ignition/user.ign" Dec 13 15:57:48.477836 ignition[618]: failed to fetch config: resource requires networking Dec 13 15:57:48.477984 ignition[618]: Ignition finished successfully Dec 13 15:57:48.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.479898 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 15:57:48.494086 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 15:57:48.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.497000 audit: BPF prog-id=9 op=LOAD Dec 13 15:57:48.498943 systemd[1]: Starting systemd-networkd.service... Dec 13 15:57:48.523672 systemd-networkd[714]: lo: Link UP Dec 13 15:57:48.523683 systemd-networkd[714]: lo: Gained carrier Dec 13 15:57:48.524192 systemd-networkd[714]: Enumeration completed Dec 13 15:57:48.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.524407 systemd-networkd[714]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:57:48.525363 systemd-networkd[714]: eth0: Link UP Dec 13 15:57:48.525368 systemd-networkd[714]: eth0: Gained carrier Dec 13 15:57:48.525720 systemd[1]: Started systemd-networkd.service. Dec 13 15:57:48.527271 systemd[1]: Reached target network.target. Dec 13 15:57:48.529397 systemd[1]: Starting ignition-fetch.service... Dec 13 15:57:48.536641 systemd[1]: Starting iscsiuio.service... Dec 13 15:57:48.545617 systemd-networkd[714]: eth0: DHCPv4 address 10.244.97.146/30, gateway 10.244.97.145 acquired from 10.244.97.145 Dec 13 15:57:48.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.546289 systemd[1]: Started iscsiuio.service. Dec 13 15:57:48.548653 systemd[1]: Starting iscsid.service... Dec 13 15:57:48.552039 iscsid[724]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:57:48.552039 iscsid[724]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 15:57:48.552039 iscsid[724]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 15:57:48.552039 iscsid[724]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 15:57:48.552039 iscsid[724]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:57:48.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.557128 iscsid[724]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 15:57:48.553972 systemd[1]: Started iscsid.service. Dec 13 15:57:48.555268 systemd[1]: Starting dracut-initqueue.service... Dec 13 15:57:48.561079 ignition[716]: Ignition 2.14.0 Dec 13 15:57:48.561088 ignition[716]: Stage: fetch Dec 13 15:57:48.561228 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:57:48.561245 ignition[716]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:57:48.562277 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:57:48.562384 ignition[716]: parsed url from cmdline: "" Dec 13 15:57:48.567431 systemd[1]: Finished dracut-initqueue.service. Dec 13 15:57:48.562388 ignition[716]: no config URL provided Dec 13 15:57:48.562393 ignition[716]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:57:48.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.562401 ignition[716]: no config at "/usr/lib/ignition/user.ign" Dec 13 15:57:48.569056 systemd[1]: Reached target remote-fs-pre.target. Dec 13 15:57:48.564678 ignition[716]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 15:57:48.570090 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:57:48.564707 ignition[716]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 15:57:48.570816 systemd[1]: Reached target remote-fs.target. Dec 13 15:57:48.564917 ignition[716]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 15:57:48.572315 systemd[1]: Starting dracut-pre-mount.service... Dec 13 15:57:48.581359 systemd[1]: Finished dracut-pre-mount.service. Dec 13 15:57:48.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.583394 ignition[716]: GET result: OK Dec 13 15:57:48.583734 ignition[716]: parsing config with SHA512: a485b10455c82090b60da215f4a044c9bb785ee6b6229ad09cefa2630dd0c9ac588cdd5a78d3d948ad81d00f9a6ae31d4dcb81410a2b07f7857fff054544a5d2 Dec 13 15:57:48.589255 unknown[716]: fetched base config from "system" Dec 13 15:57:48.589738 unknown[716]: fetched base config from "system" Dec 13 15:57:48.590158 unknown[716]: fetched user config from "openstack" Dec 13 15:57:48.590878 ignition[716]: fetch: fetch complete Dec 13 15:57:48.591279 ignition[716]: fetch: fetch passed Dec 13 15:57:48.591702 ignition[716]: Ignition finished successfully Dec 13 15:57:48.595216 systemd[1]: Finished ignition-fetch.service. Dec 13 15:57:48.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.597648 systemd[1]: Starting ignition-kargs.service... Dec 13 15:57:48.609156 ignition[739]: Ignition 2.14.0 Dec 13 15:57:48.609714 ignition[739]: Stage: kargs Dec 13 15:57:48.610191 ignition[739]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:57:48.610715 ignition[739]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:57:48.612128 ignition[739]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:57:48.613482 ignition[739]: kargs: kargs passed Dec 13 15:57:48.613928 ignition[739]: Ignition finished successfully Dec 13 15:57:48.615570 systemd[1]: Finished ignition-kargs.service. Dec 13 15:57:48.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.618530 systemd[1]: Starting ignition-disks.service... Dec 13 15:57:48.628560 ignition[744]: Ignition 2.14.0 Dec 13 15:57:48.629092 ignition[744]: Stage: disks Dec 13 15:57:48.629591 ignition[744]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:57:48.630123 ignition[744]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:57:48.631178 ignition[744]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:57:48.632656 ignition[744]: disks: disks passed Dec 13 15:57:48.633096 ignition[744]: Ignition finished successfully Dec 13 15:57:48.634442 systemd[1]: Finished ignition-disks.service. Dec 13 15:57:48.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.635158 systemd[1]: Reached target initrd-root-device.target. Dec 13 15:57:48.635798 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:57:48.636484 systemd[1]: Reached target local-fs.target. Dec 13 15:57:48.637149 systemd[1]: Reached target sysinit.target. Dec 13 15:57:48.637775 systemd[1]: Reached target basic.target. Dec 13 15:57:48.639293 systemd[1]: Starting systemd-fsck-root.service... Dec 13 15:57:48.654472 systemd-fsck[752]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 15:57:48.657612 systemd[1]: Finished systemd-fsck-root.service. Dec 13 15:57:48.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.661501 systemd[1]: Mounting sysroot.mount... Dec 13 15:57:48.673541 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 15:57:48.674974 systemd[1]: Mounted sysroot.mount. Dec 13 15:57:48.676062 systemd[1]: Reached target initrd-root-fs.target. Dec 13 15:57:48.679081 systemd[1]: Mounting sysroot-usr.mount... Dec 13 15:57:48.681785 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 15:57:48.683464 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 15:57:48.684597 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 15:57:48.684670 systemd[1]: Reached target ignition-diskful.target. Dec 13 15:57:48.687594 systemd[1]: Mounted sysroot-usr.mount. Dec 13 15:57:48.689445 systemd[1]: Starting initrd-setup-root.service... Dec 13 15:57:48.699441 initrd-setup-root[763]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 15:57:48.716867 initrd-setup-root[771]: cut: /sysroot/etc/group: No such file or directory Dec 13 15:57:48.726483 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 15:57:48.733011 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 15:57:48.778951 systemd[1]: Finished initrd-setup-root.service. Dec 13 15:57:48.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.780235 systemd[1]: Starting ignition-mount.service... Dec 13 15:57:48.791705 systemd[1]: Starting sysroot-boot.service... Dec 13 15:57:48.798659 bash[806]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 15:57:48.816550 ignition[808]: INFO : Ignition 2.14.0 Dec 13 15:57:48.816550 ignition[808]: INFO : Stage: mount Dec 13 15:57:48.816550 ignition[808]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:57:48.816550 ignition[808]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:57:48.818660 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:57:48.818660 ignition[808]: INFO : mount: mount passed Dec 13 15:57:48.818660 ignition[808]: INFO : Ignition finished successfully Dec 13 15:57:48.820588 systemd[1]: Finished sysroot-boot.service. Dec 13 15:57:48.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.821469 systemd[1]: Finished ignition-mount.service. Dec 13 15:57:48.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.822541 coreos-metadata[758]: Dec 13 15:57:48.821 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 15:57:48.838328 coreos-metadata[758]: Dec 13 15:57:48.838 INFO Fetch successful Dec 13 15:57:48.839677 coreos-metadata[758]: Dec 13 15:57:48.839 INFO wrote hostname srv-bzlf9.gb1.brightbox.com to /sysroot/etc/hostname Dec 13 15:57:48.844110 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 15:57:48.844341 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 15:57:48.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:49.233216 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 15:57:49.246587 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (815) Dec 13 15:57:49.249138 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:57:49.249210 kernel: BTRFS info (device vda6): using free space tree Dec 13 15:57:49.249250 kernel: BTRFS info (device vda6): has skinny extents Dec 13 15:57:49.258363 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 15:57:49.263297 systemd[1]: Starting ignition-files.service... Dec 13 15:57:49.285822 ignition[835]: INFO : Ignition 2.14.0 Dec 13 15:57:49.287290 ignition[835]: INFO : Stage: files Dec 13 15:57:49.287290 ignition[835]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:57:49.287290 ignition[835]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:57:49.289836 ignition[835]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:57:49.289836 ignition[835]: DEBUG : files: compiled without relabeling support, skipping Dec 13 15:57:49.289836 ignition[835]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 15:57:49.289836 ignition[835]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 15:57:49.293441 ignition[835]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 15:57:49.294457 ignition[835]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 15:57:49.295573 unknown[835]: wrote ssh authorized keys file for user: core Dec 13 15:57:49.296449 ignition[835]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 15:57:49.297202 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 15:57:49.297202 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 15:57:49.297202 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:57:49.297202 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:57:49.297202 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:57:49.297202 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:57:49.297202 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:57:49.297202 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 15:57:49.868131 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 15:57:49.916730 systemd-networkd[714]: eth0: Gained IPv6LL Dec 13 15:57:51.428207 systemd-networkd[714]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:1864:24:19ff:fef4:6192/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:1864:24:19ff:fef4:6192/64 assigned by NDisc. Dec 13 15:57:51.428219 systemd-networkd[714]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 15:57:51.508029 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:57:51.508029 ignition[835]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:57:51.508029 ignition[835]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:57:51.508029 ignition[835]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:57:51.515469 ignition[835]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:57:51.518790 ignition[835]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:57:51.518790 ignition[835]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:57:51.518790 ignition[835]: INFO : files: files passed Dec 13 15:57:51.518790 ignition[835]: INFO : Ignition finished successfully Dec 13 15:57:51.532526 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 15:57:51.532551 kernel: audit: type=1130 audit(1734105471.521:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.519458 systemd[1]: Finished ignition-files.service. Dec 13 15:57:51.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.523335 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 15:57:51.540132 kernel: audit: type=1130 audit(1734105471.533:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.540157 kernel: audit: type=1131 audit(1734105471.533:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.529856 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 15:57:51.549272 kernel: audit: type=1130 audit(1734105471.540:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.549437 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 15:57:51.530863 systemd[1]: Starting ignition-quench.service... Dec 13 15:57:51.533955 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 15:57:51.534044 systemd[1]: Finished ignition-quench.service. Dec 13 15:57:51.537322 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 15:57:51.540690 systemd[1]: Reached target ignition-complete.target. Dec 13 15:57:51.550339 systemd[1]: Starting initrd-parse-etc.service... Dec 13 15:57:51.570124 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 15:57:51.576930 kernel: audit: type=1130 audit(1734105471.570:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.576959 kernel: audit: type=1131 audit(1734105471.570:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.570246 systemd[1]: Finished initrd-parse-etc.service. Dec 13 15:57:51.570996 systemd[1]: Reached target initrd-fs.target. Dec 13 15:57:51.578033 systemd[1]: Reached target initrd.target. Dec 13 15:57:51.579375 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 15:57:51.581614 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 15:57:51.597144 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 15:57:51.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.600687 systemd[1]: Starting initrd-cleanup.service... Dec 13 15:57:51.606234 kernel: audit: type=1130 audit(1734105471.597:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.611092 systemd[1]: Stopped target nss-lookup.target. Dec 13 15:57:51.611595 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 15:57:51.612453 systemd[1]: Stopped target timers.target. Dec 13 15:57:51.613219 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 15:57:51.613361 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 15:57:51.627339 kernel: audit: type=1131 audit(1734105471.613:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.614267 systemd[1]: Stopped target initrd.target. Dec 13 15:57:51.626132 systemd[1]: Stopped target basic.target. Dec 13 15:57:51.626575 systemd[1]: Stopped target ignition-complete.target. Dec 13 15:57:51.627665 systemd[1]: Stopped target ignition-diskful.target. Dec 13 15:57:51.628753 systemd[1]: Stopped target initrd-root-device.target. Dec 13 15:57:51.629792 systemd[1]: Stopped target remote-fs.target. Dec 13 15:57:51.631036 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 15:57:51.632128 systemd[1]: Stopped target sysinit.target. Dec 13 15:57:51.633150 systemd[1]: Stopped target local-fs.target. Dec 13 15:57:51.634057 systemd[1]: Stopped target local-fs-pre.target. Dec 13 15:57:51.640471 kernel: audit: type=1131 audit(1734105471.635:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.634848 systemd[1]: Stopped target swap.target. Dec 13 15:57:51.635595 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 15:57:51.644940 kernel: audit: type=1131 audit(1734105471.641:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.635725 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 15:57:51.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.636494 systemd[1]: Stopped target cryptsetup.target. Dec 13 15:57:51.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.640847 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 15:57:51.640978 systemd[1]: Stopped dracut-initqueue.service. Dec 13 15:57:51.641722 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 15:57:51.641844 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 15:57:51.645423 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 15:57:51.645555 systemd[1]: Stopped ignition-files.service. Dec 13 15:57:51.647020 systemd[1]: Stopping ignition-mount.service... Dec 13 15:57:51.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.658453 ignition[873]: INFO : Ignition 2.14.0 Dec 13 15:57:51.658453 ignition[873]: INFO : Stage: umount Dec 13 15:57:51.658453 ignition[873]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:57:51.658453 ignition[873]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:57:51.658453 ignition[873]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:57:51.658453 ignition[873]: INFO : umount: umount passed Dec 13 15:57:51.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.650061 systemd[1]: Stopping iscsiuio.service... Dec 13 15:57:51.662935 ignition[873]: INFO : Ignition finished successfully Dec 13 15:57:51.650392 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 15:57:51.650493 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 15:57:51.653947 systemd[1]: Stopping sysroot-boot.service... Dec 13 15:57:51.654378 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 15:57:51.654540 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 15:57:51.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.655087 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 15:57:51.655187 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 15:57:51.657826 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 15:57:51.657988 systemd[1]: Stopped iscsiuio.service. Dec 13 15:57:51.659875 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 15:57:51.659972 systemd[1]: Stopped ignition-mount.service. Dec 13 15:57:51.668957 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 15:57:51.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.669056 systemd[1]: Stopped ignition-disks.service. Dec 13 15:57:51.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.673290 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 15:57:51.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.673340 systemd[1]: Stopped ignition-kargs.service. Dec 13 15:57:51.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.673886 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 15:57:51.673929 systemd[1]: Stopped ignition-fetch.service. Dec 13 15:57:51.674537 systemd[1]: Stopped target network.target. Dec 13 15:57:51.675800 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 15:57:51.675845 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 15:57:51.676226 systemd[1]: Stopped target paths.target. Dec 13 15:57:51.676556 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 15:57:51.680560 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 15:57:51.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.680937 systemd[1]: Stopped target slices.target. Dec 13 15:57:51.681253 systemd[1]: Stopped target sockets.target. Dec 13 15:57:51.681608 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 15:57:51.681634 systemd[1]: Closed iscsid.socket. Dec 13 15:57:51.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.681969 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 15:57:51.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.702000 audit: BPF prog-id=6 op=UNLOAD Dec 13 15:57:51.682004 systemd[1]: Closed iscsiuio.socket. Dec 13 15:57:51.682327 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 15:57:51.682362 systemd[1]: Stopped ignition-setup.service. Dec 13 15:57:51.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.682855 systemd[1]: Stopping systemd-networkd.service... Dec 13 15:57:51.688362 systemd[1]: Stopping systemd-resolved.service... Dec 13 15:57:51.688721 systemd-networkd[714]: eth0: DHCPv6 lease lost Dec 13 15:57:51.705000 audit: BPF prog-id=9 op=UNLOAD Dec 13 15:57:51.696349 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 15:57:51.697145 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 15:57:51.697251 systemd[1]: Stopped systemd-resolved.service. Dec 13 15:57:51.698390 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 15:57:51.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.698494 systemd[1]: Stopped systemd-networkd.service. Dec 13 15:57:51.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.700223 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 15:57:51.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.700331 systemd[1]: Finished initrd-cleanup.service. Dec 13 15:57:51.701172 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 15:57:51.701263 systemd[1]: Stopped sysroot-boot.service. Dec 13 15:57:51.703034 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 15:57:51.703072 systemd[1]: Closed systemd-networkd.socket. Dec 13 15:57:51.703693 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 15:57:51.703739 systemd[1]: Stopped initrd-setup-root.service. Dec 13 15:57:51.705478 systemd[1]: Stopping network-cleanup.service... Dec 13 15:57:51.707455 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 15:57:51.707522 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 15:57:51.708159 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 15:57:51.708196 systemd[1]: Stopped systemd-sysctl.service. Dec 13 15:57:51.708974 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 15:57:51.709009 systemd[1]: Stopped systemd-modules-load.service. Dec 13 15:57:51.713287 systemd[1]: Stopping systemd-udevd.service... Dec 13 15:57:51.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.714908 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 15:57:51.719210 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 15:57:51.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.719341 systemd[1]: Stopped systemd-udevd.service. Dec 13 15:57:51.720254 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 15:57:51.720338 systemd[1]: Stopped network-cleanup.service. Dec 13 15:57:51.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.721089 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 15:57:51.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.721121 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 15:57:51.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.721705 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 15:57:51.721733 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 15:57:51.722285 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 15:57:51.722333 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 15:57:51.723002 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 15:57:51.723035 systemd[1]: Stopped dracut-cmdline.service. Dec 13 15:57:51.723667 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 15:57:51.723696 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 15:57:51.725012 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 15:57:51.725552 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 15:57:51.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:51.725626 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 15:57:51.738978 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 15:57:51.739069 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 15:57:51.739533 systemd[1]: Reached target initrd-switch-root.target. Dec 13 15:57:51.740778 systemd[1]: Starting initrd-switch-root.service... Dec 13 15:57:51.752569 systemd[1]: Switching root. Dec 13 15:57:51.771413 iscsid[724]: iscsid shutting down. Dec 13 15:57:51.772080 systemd-journald[200]: Received SIGTERM from PID 1 (systemd). Dec 13 15:57:51.772143 systemd-journald[200]: Journal stopped Dec 13 15:57:54.917203 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 15:57:54.917281 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 15:57:54.917295 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 15:57:54.917307 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 15:57:54.917318 kernel: SELinux: policy capability open_perms=1 Dec 13 15:57:54.917329 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 15:57:54.917344 kernel: SELinux: policy capability always_check_network=0 Dec 13 15:57:54.917355 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 15:57:54.917374 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 15:57:54.917389 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 15:57:54.917401 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 15:57:54.917417 systemd[1]: Successfully loaded SELinux policy in 47.766ms. Dec 13 15:57:54.917437 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.712ms. Dec 13 15:57:54.917453 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:57:54.917468 systemd[1]: Detected virtualization kvm. Dec 13 15:57:54.917480 systemd[1]: Detected architecture x86-64. Dec 13 15:57:54.917492 systemd[1]: Detected first boot. Dec 13 15:57:54.919563 systemd[1]: Hostname set to . Dec 13 15:57:54.919592 systemd[1]: Initializing machine ID from VM UUID. Dec 13 15:57:54.923488 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 15:57:54.924011 systemd[1]: Populated /etc with preset unit settings. Dec 13 15:57:54.924045 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:57:54.924062 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:57:54.924080 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:57:54.924096 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 15:57:54.924110 systemd[1]: Stopped iscsid.service. Dec 13 15:57:54.924123 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 15:57:54.924137 systemd[1]: Stopped initrd-switch-root.service. Dec 13 15:57:54.924153 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 15:57:54.924167 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 15:57:54.924181 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 15:57:54.924194 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 15:57:54.924208 systemd[1]: Created slice system-getty.slice. Dec 13 15:57:54.924221 systemd[1]: Created slice system-modprobe.slice. Dec 13 15:57:54.924237 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 15:57:54.924250 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 15:57:54.924268 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 15:57:54.924282 systemd[1]: Created slice user.slice. Dec 13 15:57:54.924295 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:57:54.924309 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 15:57:54.924322 systemd[1]: Set up automount boot.automount. Dec 13 15:57:54.924339 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 15:57:54.924388 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 15:57:54.924409 systemd[1]: Stopped target initrd-fs.target. Dec 13 15:57:54.924426 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 15:57:54.924440 systemd[1]: Reached target integritysetup.target. Dec 13 15:57:54.924455 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:57:54.924922 systemd[1]: Reached target remote-fs.target. Dec 13 15:57:54.924940 systemd[1]: Reached target slices.target. Dec 13 15:57:54.924957 systemd[1]: Reached target swap.target. Dec 13 15:57:54.924970 systemd[1]: Reached target torcx.target. Dec 13 15:57:54.924982 systemd[1]: Reached target veritysetup.target. Dec 13 15:57:54.924995 systemd[1]: Listening on systemd-coredump.socket. Dec 13 15:57:54.925007 systemd[1]: Listening on systemd-initctl.socket. Dec 13 15:57:54.925019 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:57:54.925033 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:57:54.925045 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:57:54.925057 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 15:57:54.925072 systemd[1]: Mounting dev-hugepages.mount... Dec 13 15:57:54.925091 systemd[1]: Mounting dev-mqueue.mount... Dec 13 15:57:54.925103 systemd[1]: Mounting media.mount... Dec 13 15:57:54.925116 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:57:54.925128 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 15:57:54.925142 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 15:57:54.925155 systemd[1]: Mounting tmp.mount... Dec 13 15:57:54.925168 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 15:57:54.925180 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:57:54.925195 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:57:54.925207 systemd[1]: Starting modprobe@configfs.service... Dec 13 15:57:54.925220 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:57:54.925233 systemd[1]: Starting modprobe@drm.service... Dec 13 15:57:54.925245 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:57:54.925258 systemd[1]: Starting modprobe@fuse.service... Dec 13 15:57:54.925270 systemd[1]: Starting modprobe@loop.service... Dec 13 15:57:54.925283 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 15:57:54.925295 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 15:57:54.925310 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 15:57:54.925323 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 15:57:54.925335 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 15:57:54.925347 systemd[1]: Stopped systemd-journald.service. Dec 13 15:57:54.925360 systemd[1]: Starting systemd-journald.service... Dec 13 15:57:54.925373 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:57:54.925385 systemd[1]: Starting systemd-network-generator.service... Dec 13 15:57:54.925397 systemd[1]: Starting systemd-remount-fs.service... Dec 13 15:57:54.925411 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:57:54.925426 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 15:57:54.925438 systemd[1]: Stopped verity-setup.service. Dec 13 15:57:54.925451 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:57:54.925463 systemd[1]: Mounted dev-hugepages.mount. Dec 13 15:57:54.925477 systemd[1]: Mounted dev-mqueue.mount. Dec 13 15:57:54.925489 systemd[1]: Mounted media.mount. Dec 13 15:57:54.925500 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 15:57:54.925513 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 15:57:54.925956 systemd[1]: Mounted tmp.mount. Dec 13 15:57:54.925977 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:57:54.925992 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 15:57:54.926014 systemd[1]: Finished modprobe@configfs.service. Dec 13 15:57:54.926028 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:57:54.926042 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:57:54.926058 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:57:54.926072 systemd[1]: Finished modprobe@drm.service. Dec 13 15:57:54.926086 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:57:54.926100 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:57:54.926113 kernel: fuse: init (API version 7.34) Dec 13 15:57:54.926128 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:57:54.926142 systemd[1]: Finished systemd-network-generator.service. Dec 13 15:57:54.926155 systemd[1]: Finished systemd-remount-fs.service. Dec 13 15:57:54.926173 systemd-journald[976]: Journal started Dec 13 15:57:54.926230 systemd-journald[976]: Runtime Journal (/run/log/journal/72bcb7a83269455da82b898c191da497) is 4.7M, max 38.1M, 33.3M free. Dec 13 15:57:51.901000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 15:57:51.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:57:51.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:57:51.953000 audit: BPF prog-id=10 op=LOAD Dec 13 15:57:51.953000 audit: BPF prog-id=10 op=UNLOAD Dec 13 15:57:51.953000 audit: BPF prog-id=11 op=LOAD Dec 13 15:57:51.953000 audit: BPF prog-id=11 op=UNLOAD Dec 13 15:57:52.047000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 15:57:54.928980 systemd[1]: Started systemd-journald.service. Dec 13 15:57:52.047000 audit[906]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:52.047000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:57:52.049000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 15:57:52.049000 audit[906]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:52.049000 audit: CWD cwd="/" Dec 13 15:57:52.049000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:52.049000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:52.049000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:57:54.746000 audit: BPF prog-id=12 op=LOAD Dec 13 15:57:54.746000 audit: BPF prog-id=3 op=UNLOAD Dec 13 15:57:54.747000 audit: BPF prog-id=13 op=LOAD Dec 13 15:57:54.747000 audit: BPF prog-id=14 op=LOAD Dec 13 15:57:54.747000 audit: BPF prog-id=4 op=UNLOAD Dec 13 15:57:54.747000 audit: BPF prog-id=5 op=UNLOAD Dec 13 15:57:54.748000 audit: BPF prog-id=15 op=LOAD Dec 13 15:57:54.748000 audit: BPF prog-id=12 op=UNLOAD Dec 13 15:57:54.748000 audit: BPF prog-id=16 op=LOAD Dec 13 15:57:54.748000 audit: BPF prog-id=17 op=LOAD Dec 13 15:57:54.748000 audit: BPF prog-id=13 op=UNLOAD Dec 13 15:57:54.748000 audit: BPF prog-id=14 op=UNLOAD Dec 13 15:57:54.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.759000 audit: BPF prog-id=15 op=UNLOAD Dec 13 15:57:54.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.857000 audit: BPF prog-id=18 op=LOAD Dec 13 15:57:54.857000 audit: BPF prog-id=19 op=LOAD Dec 13 15:57:54.857000 audit: BPF prog-id=20 op=LOAD Dec 13 15:57:54.857000 audit: BPF prog-id=16 op=UNLOAD Dec 13 15:57:54.857000 audit: BPF prog-id=17 op=UNLOAD Dec 13 15:57:54.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.915000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 15:57:54.915000 audit[976]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffc0b010ff0 a2=4000 a3=7ffc0b01108c items=0 ppid=1 pid=976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:54.915000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 15:57:54.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.745485 systemd[1]: Queued start job for default target multi-user.target. Dec 13 15:57:52.046094 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:57:54.745499 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 15:57:52.046633 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:57:54.750859 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 15:57:52.046658 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:57:54.928122 systemd[1]: Reached target network-pre.target. Dec 13 15:57:52.046693 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 15:57:54.929813 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 15:57:52.046704 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 15:57:52.046744 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 15:57:52.046758 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 15:57:52.046987 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 15:57:52.047039 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:57:52.047054 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:57:52.047666 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 15:57:52.047703 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 15:57:52.047722 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 15:57:52.047737 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 15:57:52.047757 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 15:57:52.047771 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 15:57:54.348496 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:54Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:57:54.348795 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:54Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:57:54.348909 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:54Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:57:54.349096 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:54Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:57:54.933117 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 15:57:54.349148 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:54Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 15:57:54.953720 kernel: loop: module loaded Dec 13 15:57:54.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.957430 systemd-journald[976]: Time spent on flushing to /var/log/journal/72bcb7a83269455da82b898c191da497 is 43.979ms for 1275 entries. Dec 13 15:57:54.957430 systemd-journald[976]: System Journal (/var/log/journal/72bcb7a83269455da82b898c191da497) is 8.0M, max 584.8M, 576.8M free. Dec 13 15:57:55.019616 systemd-journald[976]: Received client request to flush runtime journal. Dec 13 15:57:54.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:55.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.935315 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 15:57:55.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.349208 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T15:57:54Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 15:57:54.938953 systemd[1]: Starting systemd-journal-flush.service... Dec 13 15:57:54.939429 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:57:54.940642 systemd[1]: Starting systemd-random-seed.service... Dec 13 15:57:54.943215 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:57:54.945877 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 15:57:54.946020 systemd[1]: Finished modprobe@fuse.service. Dec 13 15:57:54.947804 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 15:57:54.952923 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 15:57:54.954111 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:57:54.954231 systemd[1]: Finished modprobe@loop.service. Dec 13 15:57:54.954807 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:57:54.956700 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 15:57:54.964602 systemd[1]: Finished systemd-random-seed.service. Dec 13 15:57:54.965073 systemd[1]: Reached target first-boot-complete.target. Dec 13 15:57:54.977792 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:57:55.014501 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 15:57:55.016196 systemd[1]: Starting systemd-sysusers.service... Dec 13 15:57:55.020350 systemd[1]: Finished systemd-journal-flush.service. Dec 13 15:57:55.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:55.036734 systemd[1]: Finished systemd-sysusers.service. Dec 13 15:57:55.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:55.053225 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:57:55.054862 systemd[1]: Starting systemd-udev-settle.service... Dec 13 15:57:55.064581 udevadm[1016]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 15:57:55.534870 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 15:57:55.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:55.540000 audit: BPF prog-id=21 op=LOAD Dec 13 15:57:55.540000 audit: BPF prog-id=22 op=LOAD Dec 13 15:57:55.540000 audit: BPF prog-id=7 op=UNLOAD Dec 13 15:57:55.540000 audit: BPF prog-id=8 op=UNLOAD Dec 13 15:57:55.542688 systemd[1]: Starting systemd-udevd.service... Dec 13 15:57:55.562441 systemd-udevd[1017]: Using default interface naming scheme 'v252'. Dec 13 15:57:55.594775 systemd[1]: Started systemd-udevd.service. Dec 13 15:57:55.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:55.595000 audit: BPF prog-id=23 op=LOAD Dec 13 15:57:55.597234 systemd[1]: Starting systemd-networkd.service... Dec 13 15:57:55.603000 audit: BPF prog-id=24 op=LOAD Dec 13 15:57:55.604000 audit: BPF prog-id=25 op=LOAD Dec 13 15:57:55.604000 audit: BPF prog-id=26 op=LOAD Dec 13 15:57:55.605548 systemd[1]: Starting systemd-userdbd.service... Dec 13 15:57:55.644016 systemd[1]: Started systemd-userdbd.service. Dec 13 15:57:55.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:55.677902 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 15:57:55.725796 systemd-networkd[1019]: lo: Link UP Dec 13 15:57:55.725806 systemd-networkd[1019]: lo: Gained carrier Dec 13 15:57:55.726323 systemd-networkd[1019]: Enumeration completed Dec 13 15:57:55.726435 systemd[1]: Started systemd-networkd.service. Dec 13 15:57:55.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:55.739535 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 15:57:55.743532 kernel: ACPI: button: Power Button [PWRF] Dec 13 15:57:55.752211 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:57:55.758531 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 15:57:55.786000 audit[1022]: AVC avc: denied { confidentiality } for pid=1022 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 15:57:55.786000 audit[1022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5637a09d3620 a1=337fc a2=7f96f90cdbc5 a3=5 items=110 ppid=1017 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:55.786000 audit: CWD cwd="/" Dec 13 15:57:55.786000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=1 name=(null) inode=15670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=2 name=(null) inode=15670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=3 name=(null) inode=15671 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=4 name=(null) inode=15670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=5 name=(null) inode=15672 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=6 name=(null) inode=15670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=7 name=(null) inode=15673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=8 name=(null) inode=15673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=9 name=(null) inode=15674 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=10 name=(null) inode=15673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=11 name=(null) inode=15675 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=12 name=(null) inode=15673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.792051 systemd-networkd[1019]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:57:55.786000 audit: PATH item=13 name=(null) inode=15676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=14 name=(null) inode=15673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=15 name=(null) inode=15677 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=16 name=(null) inode=15673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=17 name=(null) inode=15678 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=18 name=(null) inode=15670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=19 name=(null) inode=15679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=20 name=(null) inode=15679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=21 name=(null) inode=15680 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=22 name=(null) inode=15679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=23 name=(null) inode=15681 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=24 name=(null) inode=15679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=25 name=(null) inode=15682 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=26 name=(null) inode=15679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.792894 systemd-networkd[1019]: eth0: Link UP Dec 13 15:57:55.792899 systemd-networkd[1019]: eth0: Gained carrier Dec 13 15:57:55.786000 audit: PATH item=27 name=(null) inode=15683 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=28 name=(null) inode=15679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=29 name=(null) inode=15684 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=30 name=(null) inode=15670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=31 name=(null) inode=15685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=32 name=(null) inode=15685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=33 name=(null) inode=15686 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=34 name=(null) inode=15685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=35 name=(null) inode=15687 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=36 name=(null) inode=15685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=37 name=(null) inode=15688 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=38 name=(null) inode=15685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=39 name=(null) inode=15689 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=40 name=(null) inode=15685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=41 name=(null) inode=15690 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=42 name=(null) inode=15670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=43 name=(null) inode=15691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=44 name=(null) inode=15691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=45 name=(null) inode=15692 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=46 name=(null) inode=15691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=47 name=(null) inode=15693 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=48 name=(null) inode=15691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=49 name=(null) inode=15694 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=50 name=(null) inode=15691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=51 name=(null) inode=15695 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=52 name=(null) inode=15691 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=53 name=(null) inode=15696 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=55 name=(null) inode=15697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=56 name=(null) inode=15697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=57 name=(null) inode=15698 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=58 name=(null) inode=15697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=59 name=(null) inode=15699 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=60 name=(null) inode=15697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=61 name=(null) inode=15700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=62 name=(null) inode=15700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=63 name=(null) inode=15701 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=64 name=(null) inode=15700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=65 name=(null) inode=15702 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=66 name=(null) inode=15700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=67 name=(null) inode=15703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=68 name=(null) inode=15700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=69 name=(null) inode=15704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=70 name=(null) inode=15700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=71 name=(null) inode=15705 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=72 name=(null) inode=15697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=73 name=(null) inode=15706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.802670 systemd-networkd[1019]: eth0: DHCPv4 address 10.244.97.146/30, gateway 10.244.97.145 acquired from 10.244.97.145 Dec 13 15:57:55.786000 audit: PATH item=74 name=(null) inode=15706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=75 name=(null) inode=15707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=76 name=(null) inode=15706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=77 name=(null) inode=15708 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=78 name=(null) inode=15706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=79 name=(null) inode=15709 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=80 name=(null) inode=15706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=81 name=(null) inode=15710 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=82 name=(null) inode=15706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=83 name=(null) inode=15711 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=84 name=(null) inode=15697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=85 name=(null) inode=15712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=86 name=(null) inode=15712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=87 name=(null) inode=15713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=88 name=(null) inode=15712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=89 name=(null) inode=15714 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=90 name=(null) inode=15712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=91 name=(null) inode=15715 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=92 name=(null) inode=15712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=93 name=(null) inode=15716 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=94 name=(null) inode=15712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=95 name=(null) inode=15717 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=96 name=(null) inode=15697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=97 name=(null) inode=15718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=98 name=(null) inode=15718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=99 name=(null) inode=15719 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=100 name=(null) inode=15718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=101 name=(null) inode=15720 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=102 name=(null) inode=15718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=103 name=(null) inode=15721 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=104 name=(null) inode=15718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=105 name=(null) inode=15722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=106 name=(null) inode=15718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=107 name=(null) inode=15723 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PATH item=109 name=(null) inode=15724 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:55.786000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 15:57:55.817537 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 15:57:55.841525 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 15:57:55.854081 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 15:57:55.854243 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 15:57:56.004177 systemd[1]: Finished systemd-udev-settle.service. Dec 13 15:57:56.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.009195 systemd[1]: Starting lvm2-activation-early.service... Dec 13 15:57:56.036448 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:57:56.070826 systemd[1]: Finished lvm2-activation-early.service. Dec 13 15:57:56.072035 systemd[1]: Reached target cryptsetup.target. Dec 13 15:57:56.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.074724 systemd[1]: Starting lvm2-activation.service... Dec 13 15:57:56.084938 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:57:56.109853 systemd[1]: Finished lvm2-activation.service. Dec 13 15:57:56.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.110481 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:57:56.110931 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 15:57:56.110963 systemd[1]: Reached target local-fs.target. Dec 13 15:57:56.111339 systemd[1]: Reached target machines.target. Dec 13 15:57:56.113207 systemd[1]: Starting ldconfig.service... Dec 13 15:57:56.114303 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.114381 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:57:56.116175 systemd[1]: Starting systemd-boot-update.service... Dec 13 15:57:56.118870 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 15:57:56.122730 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 15:57:56.125834 systemd[1]: Starting systemd-sysext.service... Dec 13 15:57:56.135292 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1049 (bootctl) Dec 13 15:57:56.136827 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 15:57:56.141964 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 15:57:56.154536 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 15:57:56.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.159814 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 15:57:56.160016 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 15:57:56.177638 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 15:57:56.178200 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 15:57:56.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.183584 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 15:57:56.204532 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 15:57:56.217819 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 15:57:56.225009 (sd-sysext)[1061]: Using extensions 'kubernetes'. Dec 13 15:57:56.226335 (sd-sysext)[1061]: Merged extensions into '/usr'. Dec 13 15:57:56.249320 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:57:56.251673 systemd[1]: Mounting usr-share-oem.mount... Dec 13 15:57:56.252318 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.255683 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:57:56.257911 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:57:56.261042 systemd[1]: Starting modprobe@loop.service... Dec 13 15:57:56.261418 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.261543 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:57:56.261733 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:57:56.262883 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:57:56.263012 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:57:56.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.264525 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:57:56.264663 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:57:56.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.265792 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:57:56.266148 systemd[1]: Finished modprobe@loop.service. Dec 13 15:57:56.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.269912 systemd[1]: Mounted usr-share-oem.mount. Dec 13 15:57:56.270746 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:57:56.270853 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.272130 systemd[1]: Finished systemd-sysext.service. Dec 13 15:57:56.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.275495 systemd[1]: Starting ensure-sysext.service... Dec 13 15:57:56.279593 systemd-fsck[1058]: fsck.fat 4.2 (2021-01-31) Dec 13 15:57:56.279593 systemd-fsck[1058]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 15:57:56.279327 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 15:57:56.295026 systemd[1]: Reloading. Dec 13 15:57:56.315094 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 15:57:56.326791 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 15:57:56.342419 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 15:57:56.377428 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2024-12-13T15:57:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:57:56.377458 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2024-12-13T15:57:56Z" level=info msg="torcx already run" Dec 13 15:57:56.446642 ldconfig[1048]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 15:57:56.476566 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:57:56.476584 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:57:56.495622 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:57:56.561059 kernel: kauditd_printk_skb: 238 callbacks suppressed Dec 13 15:57:56.561208 kernel: audit: type=1334 audit(1734105476.551:164): prog-id=27 op=LOAD Dec 13 15:57:56.561265 kernel: audit: type=1334 audit(1734105476.551:165): prog-id=28 op=LOAD Dec 13 15:57:56.561302 kernel: audit: type=1334 audit(1734105476.551:166): prog-id=21 op=UNLOAD Dec 13 15:57:56.551000 audit: BPF prog-id=27 op=LOAD Dec 13 15:57:56.551000 audit: BPF prog-id=28 op=LOAD Dec 13 15:57:56.551000 audit: BPF prog-id=21 op=UNLOAD Dec 13 15:57:56.551000 audit: BPF prog-id=22 op=UNLOAD Dec 13 15:57:56.564882 kernel: audit: type=1334 audit(1734105476.551:167): prog-id=22 op=UNLOAD Dec 13 15:57:56.564933 kernel: audit: type=1334 audit(1734105476.554:168): prog-id=29 op=LOAD Dec 13 15:57:56.554000 audit: BPF prog-id=29 op=LOAD Dec 13 15:57:56.568586 kernel: audit: type=1334 audit(1734105476.554:169): prog-id=23 op=UNLOAD Dec 13 15:57:56.554000 audit: BPF prog-id=23 op=UNLOAD Dec 13 15:57:56.567372 systemd[1]: Finished ldconfig.service. Dec 13 15:57:56.569199 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 15:57:56.556000 audit: BPF prog-id=30 op=LOAD Dec 13 15:57:56.571553 kernel: audit: type=1334 audit(1734105476.556:170): prog-id=30 op=LOAD Dec 13 15:57:56.574864 systemd[1]: Mounting boot.mount... Dec 13 15:57:56.578665 kernel: audit: type=1334 audit(1734105476.556:171): prog-id=24 op=UNLOAD Dec 13 15:57:56.578738 kernel: audit: type=1334 audit(1734105476.558:172): prog-id=31 op=LOAD Dec 13 15:57:56.578767 kernel: audit: type=1334 audit(1734105476.560:173): prog-id=32 op=LOAD Dec 13 15:57:56.556000 audit: BPF prog-id=24 op=UNLOAD Dec 13 15:57:56.558000 audit: BPF prog-id=31 op=LOAD Dec 13 15:57:56.560000 audit: BPF prog-id=32 op=LOAD Dec 13 15:57:56.560000 audit: BPF prog-id=25 op=UNLOAD Dec 13 15:57:56.560000 audit: BPF prog-id=26 op=UNLOAD Dec 13 15:57:56.564000 audit: BPF prog-id=33 op=LOAD Dec 13 15:57:56.564000 audit: BPF prog-id=18 op=UNLOAD Dec 13 15:57:56.564000 audit: BPF prog-id=34 op=LOAD Dec 13 15:57:56.564000 audit: BPF prog-id=35 op=LOAD Dec 13 15:57:56.564000 audit: BPF prog-id=19 op=UNLOAD Dec 13 15:57:56.564000 audit: BPF prog-id=20 op=UNLOAD Dec 13 15:57:56.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.583289 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:57:56.583827 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.585250 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:57:56.586901 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:57:56.589103 systemd[1]: Starting modprobe@loop.service... Dec 13 15:57:56.589600 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.589713 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:57:56.589823 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:57:56.592193 systemd[1]: Mounted boot.mount. Dec 13 15:57:56.593089 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:57:56.593211 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:57:56.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.593953 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:57:56.594068 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:57:56.594794 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:57:56.594904 systemd[1]: Finished modprobe@loop.service. Dec 13 15:57:56.595636 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:57:56.595726 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.599999 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.603048 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:57:56.605154 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:57:56.608113 systemd[1]: Starting modprobe@loop.service... Dec 13 15:57:56.608527 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.608650 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:57:56.609538 systemd[1]: Finished systemd-boot-update.service. Dec 13 15:57:56.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.610274 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:57:56.610388 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:57:56.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.611184 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:57:56.611295 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:57:56.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.612008 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:57:56.612114 systemd[1]: Finished modprobe@loop.service. Dec 13 15:57:56.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.612870 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:57:56.612967 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.615517 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.617754 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:57:56.619853 systemd[1]: Starting modprobe@drm.service... Dec 13 15:57:56.621420 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:57:56.623091 systemd[1]: Starting modprobe@loop.service... Dec 13 15:57:56.623887 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.624032 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:57:56.626291 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 15:57:56.627794 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:57:56.627916 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:57:56.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.628671 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:57:56.628781 systemd[1]: Finished modprobe@drm.service. Dec 13 15:57:56.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.629463 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:57:56.629622 systemd[1]: Finished modprobe@loop.service. Dec 13 15:57:56.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.630414 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.631844 systemd[1]: Finished ensure-sysext.service. Dec 13 15:57:56.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.634229 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:57:56.634359 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:57:56.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.634972 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:57:56.679736 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 15:57:56.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.681617 systemd[1]: Starting audit-rules.service... Dec 13 15:57:56.683311 systemd[1]: Starting clean-ca-certificates.service... Dec 13 15:57:56.686044 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 15:57:56.688000 audit: BPF prog-id=36 op=LOAD Dec 13 15:57:56.690000 audit: BPF prog-id=37 op=LOAD Dec 13 15:57:56.690178 systemd[1]: Starting systemd-resolved.service... Dec 13 15:57:56.693839 systemd[1]: Starting systemd-timesyncd.service... Dec 13 15:57:56.695390 systemd[1]: Starting systemd-update-utmp.service... Dec 13 15:57:56.707588 systemd[1]: Finished clean-ca-certificates.service. Dec 13 15:57:56.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.708067 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:57:56.709000 audit[1153]: SYSTEM_BOOT pid=1153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.711938 systemd[1]: Finished systemd-update-utmp.service. Dec 13 15:57:56.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.738148 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 15:57:56.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.740016 systemd[1]: Starting systemd-update-done.service... Dec 13 15:57:56.749305 systemd[1]: Finished systemd-update-done.service. Dec 13 15:57:56.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:56.756000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 15:57:56.756000 audit[1168]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc12521810 a2=420 a3=0 items=0 ppid=1147 pid=1168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:56.756000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 15:57:56.757275 augenrules[1168]: No rules Dec 13 15:57:56.758837 systemd[1]: Finished audit-rules.service. Dec 13 15:57:56.781593 systemd[1]: Started systemd-timesyncd.service. Dec 13 15:57:56.782128 systemd[1]: Reached target time-set.target. Dec 13 15:57:56.784669 systemd-resolved[1150]: Positive Trust Anchors: Dec 13 15:57:56.784682 systemd-resolved[1150]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:57:56.784717 systemd-resolved[1150]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:57:56.790478 systemd-resolved[1150]: Using system hostname 'srv-bzlf9.gb1.brightbox.com'. Dec 13 15:57:56.792074 systemd[1]: Started systemd-resolved.service. Dec 13 15:57:56.792559 systemd[1]: Reached target network.target. Dec 13 15:57:56.792895 systemd[1]: Reached target nss-lookup.target. Dec 13 15:57:56.793236 systemd[1]: Reached target sysinit.target. Dec 13 15:57:56.793658 systemd[1]: Started motdgen.path. Dec 13 15:57:56.794002 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 15:57:56.794571 systemd[1]: Started logrotate.timer. Dec 13 15:57:56.794979 systemd[1]: Started mdadm.timer. Dec 13 15:57:56.795300 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 15:57:56.795725 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 15:57:56.795757 systemd[1]: Reached target paths.target. Dec 13 15:57:56.796078 systemd[1]: Reached target timers.target. Dec 13 15:57:56.796717 systemd[1]: Listening on dbus.socket. Dec 13 15:57:56.798275 systemd[1]: Starting docker.socket... Dec 13 15:57:56.802091 systemd[1]: Listening on sshd.socket. Dec 13 15:57:56.802656 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:57:56.803118 systemd[1]: Listening on docker.socket. Dec 13 15:57:56.803558 systemd[1]: Reached target sockets.target. Dec 13 15:57:56.803902 systemd[1]: Reached target basic.target. Dec 13 15:57:56.804264 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.804291 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:57:56.805420 systemd[1]: Starting containerd.service... Dec 13 15:57:56.807026 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 15:57:56.817580 systemd[1]: Starting dbus.service... Dec 13 15:57:56.819689 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 15:57:56.824851 systemd[1]: Starting extend-filesystems.service... Dec 13 15:57:56.825424 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 15:57:56.827737 systemd[1]: Starting motdgen.service... Dec 13 15:57:56.829390 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 15:57:56.832171 systemd[1]: Starting sshd-keygen.service... Dec 13 15:57:56.838130 systemd[1]: Starting systemd-logind.service... Dec 13 15:57:56.865220 jq[1181]: false Dec 13 15:57:56.840637 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:57:56.840731 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 15:57:56.865769 jq[1192]: true Dec 13 15:57:56.841274 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 15:57:56.842168 systemd[1]: Starting update-engine.service... Dec 13 15:57:56.845789 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 15:57:56.850371 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 15:57:56.850618 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 15:57:56.851019 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 15:57:56.851184 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 15:57:56.865534 systemd-timesyncd[1151]: Contacted time server 131.111.8.63:123 (0.flatcar.pool.ntp.org). Dec 13 15:57:56.865604 systemd-timesyncd[1151]: Initial clock synchronization to Fri 2024-12-13 15:57:57.227055 UTC. Dec 13 15:57:56.878553 extend-filesystems[1182]: Found loop1 Dec 13 15:57:56.882480 dbus-daemon[1180]: [system] SELinux support is enabled Dec 13 15:57:56.882944 systemd[1]: Started dbus.service. Dec 13 15:57:56.885640 extend-filesystems[1182]: Found vda Dec 13 15:57:56.886122 extend-filesystems[1182]: Found vda1 Dec 13 15:57:56.886986 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 15:57:56.887027 systemd[1]: Reached target system-config.target. Dec 13 15:57:56.887432 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 15:57:56.887459 systemd[1]: Reached target user-config.target. Dec 13 15:57:56.888025 extend-filesystems[1182]: Found vda2 Dec 13 15:57:56.888770 extend-filesystems[1182]: Found vda3 Dec 13 15:57:56.889203 extend-filesystems[1182]: Found usr Dec 13 15:57:56.889658 extend-filesystems[1182]: Found vda4 Dec 13 15:57:56.890089 dbus-daemon[1180]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.3' (uid=244 pid=1019 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 15:57:56.890213 extend-filesystems[1182]: Found vda6 Dec 13 15:57:56.890701 extend-filesystems[1182]: Found vda7 Dec 13 15:57:56.891115 extend-filesystems[1182]: Found vda9 Dec 13 15:57:56.892092 extend-filesystems[1182]: Checking size of /dev/vda9 Dec 13 15:57:56.894134 systemd[1]: Starting systemd-hostnamed.service... Dec 13 15:57:56.903810 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 15:57:56.903988 systemd[1]: Finished motdgen.service. Dec 13 15:57:56.906246 jq[1203]: true Dec 13 15:57:56.913220 extend-filesystems[1182]: Resized partition /dev/vda9 Dec 13 15:57:56.937067 extend-filesystems[1210]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 15:57:56.944548 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Dec 13 15:57:56.954841 update_engine[1190]: I1213 15:57:56.954196 1190 main.cc:92] Flatcar Update Engine starting Dec 13 15:57:56.959102 update_engine[1190]: I1213 15:57:56.959000 1190 update_check_scheduler.cc:74] Next update check in 10m48s Dec 13 15:57:56.961566 systemd[1]: Started update-engine.service. Dec 13 15:57:56.962681 systemd[1]: Created slice system-sshd.slice. Dec 13 15:57:56.964852 systemd[1]: Started locksmithd.service. Dec 13 15:57:57.009887 bash[1232]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:57:57.010690 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 15:57:57.013743 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Dec 13 15:57:57.018933 extend-filesystems[1210]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 15:57:57.018933 extend-filesystems[1210]: old_desc_blocks = 1, new_desc_blocks = 8 Dec 13 15:57:57.018933 extend-filesystems[1210]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Dec 13 15:57:57.022523 extend-filesystems[1182]: Resized filesystem in /dev/vda9 Dec 13 15:57:57.019239 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 15:57:57.019431 systemd[1]: Finished extend-filesystems.service. Dec 13 15:57:57.039421 systemd-logind[1187]: Watching system buttons on /dev/input/event2 (Power Button) Dec 13 15:57:57.039789 systemd-logind[1187]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 15:57:57.040043 systemd-logind[1187]: New seat seat0. Dec 13 15:57:57.046068 systemd[1]: Started systemd-logind.service. Dec 13 15:57:57.047771 env[1199]: time="2024-12-13T15:57:57.047700384Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 15:57:57.082065 dbus-daemon[1180]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 15:57:57.082197 systemd[1]: Started systemd-hostnamed.service. Dec 13 15:57:57.083683 dbus-daemon[1180]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1205 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 15:57:57.087151 systemd[1]: Starting polkit.service... Dec 13 15:57:57.097850 env[1199]: time="2024-12-13T15:57:57.097784653Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 15:57:57.102319 env[1199]: time="2024-12-13T15:57:57.102287023Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:57:57.105139 polkitd[1236]: Started polkitd version 121 Dec 13 15:57:57.109118 env[1199]: time="2024-12-13T15:57:57.107962270Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:57:57.109118 env[1199]: time="2024-12-13T15:57:57.108003773Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:57:57.109118 env[1199]: time="2024-12-13T15:57:57.108276582Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:57:57.109118 env[1199]: time="2024-12-13T15:57:57.108296285Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 15:57:57.109118 env[1199]: time="2024-12-13T15:57:57.108314799Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 15:57:57.109118 env[1199]: time="2024-12-13T15:57:57.108325791Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 15:57:57.109118 env[1199]: time="2024-12-13T15:57:57.108410120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:57:57.109118 env[1199]: time="2024-12-13T15:57:57.108695752Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:57:57.109118 env[1199]: time="2024-12-13T15:57:57.108840565Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:57:57.109118 env[1199]: time="2024-12-13T15:57:57.108858428Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 15:57:57.109678 env[1199]: time="2024-12-13T15:57:57.108910332Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 15:57:57.109678 env[1199]: time="2024-12-13T15:57:57.108923287Z" level=info msg="metadata content store policy set" policy=shared Dec 13 15:57:57.112950 env[1199]: time="2024-12-13T15:57:57.112848269Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 15:57:57.112950 env[1199]: time="2024-12-13T15:57:57.112891219Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 15:57:57.112950 env[1199]: time="2024-12-13T15:57:57.112911697Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 15:57:57.113655 env[1199]: time="2024-12-13T15:57:57.113136959Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 15:57:57.113655 env[1199]: time="2024-12-13T15:57:57.113163704Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 15:57:57.113655 env[1199]: time="2024-12-13T15:57:57.113181771Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 15:57:57.113655 env[1199]: time="2024-12-13T15:57:57.113194337Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 15:57:57.113655 env[1199]: time="2024-12-13T15:57:57.113208952Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 15:57:57.113655 env[1199]: time="2024-12-13T15:57:57.113222862Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 15:57:57.113655 env[1199]: time="2024-12-13T15:57:57.113240154Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 15:57:57.113655 env[1199]: time="2024-12-13T15:57:57.113256142Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 15:57:57.114803 env[1199]: time="2024-12-13T15:57:57.114232612Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 15:57:57.114803 env[1199]: time="2024-12-13T15:57:57.114619463Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 15:57:57.115445 env[1199]: time="2024-12-13T15:57:57.115223676Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.115957364Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.116001120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.116018930Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.116111425Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.116127484Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.116220643Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.116235373Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.116248573Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.116263584Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.116276891Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.116288889Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.116588 env[1199]: time="2024-12-13T15:57:57.116302992Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 15:57:57.117850 env[1199]: time="2024-12-13T15:57:57.116967230Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.117850 env[1199]: time="2024-12-13T15:57:57.116989353Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.117850 env[1199]: time="2024-12-13T15:57:57.117005389Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.117850 env[1199]: time="2024-12-13T15:57:57.117019813Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 15:57:57.118829 env[1199]: time="2024-12-13T15:57:57.117037223Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 15:57:57.118829 env[1199]: time="2024-12-13T15:57:57.117994345Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 15:57:57.118829 env[1199]: time="2024-12-13T15:57:57.118034016Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 15:57:57.118829 env[1199]: time="2024-12-13T15:57:57.118102620Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 15:57:57.118991 env[1199]: time="2024-12-13T15:57:57.118358815Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 15:57:57.118991 env[1199]: time="2024-12-13T15:57:57.118422997Z" level=info msg="Connect containerd service" Dec 13 15:57:57.118991 env[1199]: time="2024-12-13T15:57:57.118472596Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 15:57:57.120942 env[1199]: time="2024-12-13T15:57:57.120175825Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:57:57.119119 polkitd[1236]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 15:57:57.119183 polkitd[1236]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 15:57:57.121829 env[1199]: time="2024-12-13T15:57:57.121626980Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 15:57:57.121969 env[1199]: time="2024-12-13T15:57:57.121951376Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 15:57:57.122168 systemd[1]: Started containerd.service. Dec 13 15:57:57.123525 env[1199]: time="2024-12-13T15:57:57.123137485Z" level=info msg="containerd successfully booted in 0.080548s" Dec 13 15:57:57.123525 env[1199]: time="2024-12-13T15:57:57.123140348Z" level=info msg="Start subscribing containerd event" Dec 13 15:57:57.123525 env[1199]: time="2024-12-13T15:57:57.123208981Z" level=info msg="Start recovering state" Dec 13 15:57:57.123525 env[1199]: time="2024-12-13T15:57:57.123301700Z" level=info msg="Start event monitor" Dec 13 15:57:57.123525 env[1199]: time="2024-12-13T15:57:57.123325809Z" level=info msg="Start snapshots syncer" Dec 13 15:57:57.123525 env[1199]: time="2024-12-13T15:57:57.123348367Z" level=info msg="Start cni network conf syncer for default" Dec 13 15:57:57.123525 env[1199]: time="2024-12-13T15:57:57.123356370Z" level=info msg="Start streaming server" Dec 13 15:57:57.123861 polkitd[1236]: Finished loading, compiling and executing 2 rules Dec 13 15:57:57.126726 dbus-daemon[1180]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 15:57:57.127176 systemd[1]: Started polkit.service. Dec 13 15:57:57.127127 polkitd[1236]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 15:57:57.142317 systemd-hostnamed[1205]: Hostname set to (static) Dec 13 15:57:57.159136 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:57:57.159277 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:57:57.218561 locksmithd[1219]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 15:57:57.421838 sshd_keygen[1214]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 15:57:57.459446 systemd[1]: Finished sshd-keygen.service. Dec 13 15:57:57.464890 systemd[1]: Starting issuegen.service... Dec 13 15:57:57.469718 systemd[1]: Started sshd@0-10.244.97.146:22-139.178.68.195:51586.service. Dec 13 15:57:57.479740 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 15:57:57.479939 systemd[1]: Finished issuegen.service. Dec 13 15:57:57.482261 systemd[1]: Starting systemd-user-sessions.service... Dec 13 15:57:57.491456 systemd[1]: Finished systemd-user-sessions.service. Dec 13 15:57:57.493461 systemd[1]: Started getty@tty1.service. Dec 13 15:57:57.495766 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 15:57:57.496399 systemd[1]: Reached target getty.target. Dec 13 15:57:57.662840 systemd-networkd[1019]: eth0: Gained IPv6LL Dec 13 15:57:57.666913 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 15:57:57.668072 systemd[1]: Reached target network-online.target. Dec 13 15:57:57.671685 systemd[1]: Starting kubelet.service... Dec 13 15:57:58.412569 sshd[1257]: Accepted publickey for core from 139.178.68.195 port 51586 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:57:58.415391 sshd[1257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:58.437463 systemd[1]: Created slice user-500.slice. Dec 13 15:57:58.443666 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 15:57:58.448657 systemd-logind[1187]: New session 1 of user core. Dec 13 15:57:58.454822 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 15:57:58.457209 systemd[1]: Starting user@500.service... Dec 13 15:57:58.462151 (systemd)[1268]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:58.544834 systemd[1268]: Queued start job for default target default.target. Dec 13 15:57:58.547469 systemd[1268]: Reached target paths.target. Dec 13 15:57:58.547496 systemd[1268]: Reached target sockets.target. Dec 13 15:57:58.547511 systemd[1268]: Reached target timers.target. Dec 13 15:57:58.547524 systemd[1268]: Reached target basic.target. Dec 13 15:57:58.547655 systemd[1]: Started user@500.service. Dec 13 15:57:58.549091 systemd[1]: Started session-1.scope. Dec 13 15:57:58.550964 systemd[1268]: Reached target default.target. Dec 13 15:57:58.551014 systemd[1268]: Startup finished in 78ms. Dec 13 15:57:58.556727 systemd[1]: Started kubelet.service. Dec 13 15:57:58.752900 systemd-networkd[1019]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:1864:24:19ff:fef4:6192/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:1864:24:19ff:fef4:6192/64 assigned by NDisc. Dec 13 15:57:58.753598 systemd-networkd[1019]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 15:57:59.208700 systemd[1]: Started sshd@1-10.244.97.146:22-139.178.68.195:51590.service. Dec 13 15:57:59.335695 kubelet[1276]: E1213 15:57:59.335482 1276 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:57:59.338428 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:57:59.338609 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:57:59.338912 systemd[1]: kubelet.service: Consumed 1.267s CPU time. Dec 13 15:58:00.138922 sshd[1286]: Accepted publickey for core from 139.178.68.195 port 51590 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:00.142610 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:00.154161 systemd-logind[1187]: New session 2 of user core. Dec 13 15:58:00.154966 systemd[1]: Started session-2.scope. Dec 13 15:58:00.788693 sshd[1286]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:00.794264 systemd[1]: sshd@1-10.244.97.146:22-139.178.68.195:51590.service: Deactivated successfully. Dec 13 15:58:00.795793 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 15:58:00.796882 systemd-logind[1187]: Session 2 logged out. Waiting for processes to exit. Dec 13 15:58:00.798737 systemd-logind[1187]: Removed session 2. Dec 13 15:58:00.941596 systemd[1]: Started sshd@2-10.244.97.146:22-139.178.68.195:51596.service. Dec 13 15:58:01.876029 sshd[1293]: Accepted publickey for core from 139.178.68.195 port 51596 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:01.879607 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:01.886749 systemd[1]: Started session-3.scope. Dec 13 15:58:01.887505 systemd-logind[1187]: New session 3 of user core. Dec 13 15:58:02.516213 sshd[1293]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:02.519289 systemd[1]: sshd@2-10.244.97.146:22-139.178.68.195:51596.service: Deactivated successfully. Dec 13 15:58:02.520109 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 15:58:02.522138 systemd-logind[1187]: Session 3 logged out. Waiting for processes to exit. Dec 13 15:58:02.523328 systemd-logind[1187]: Removed session 3. Dec 13 15:58:03.965487 coreos-metadata[1177]: Dec 13 15:58:03.965 WARN failed to locate config-drive, using the metadata service API instead Dec 13 15:58:04.019314 coreos-metadata[1177]: Dec 13 15:58:04.019 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 15:58:04.054537 coreos-metadata[1177]: Dec 13 15:58:04.054 INFO Fetch successful Dec 13 15:58:04.055104 coreos-metadata[1177]: Dec 13 15:58:04.055 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 15:58:04.104975 coreos-metadata[1177]: Dec 13 15:58:04.104 INFO Fetch successful Dec 13 15:58:04.107500 unknown[1177]: wrote ssh authorized keys file for user: core Dec 13 15:58:04.121643 update-ssh-keys[1300]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:58:04.123162 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 15:58:04.123795 systemd[1]: Reached target multi-user.target. Dec 13 15:58:04.126269 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 15:58:04.137239 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 15:58:04.137500 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 15:58:04.138132 systemd[1]: Startup finished in 933ms (kernel) + 6.146s (initrd) + 12.294s (userspace) = 19.373s. Dec 13 15:58:09.489273 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 15:58:09.489762 systemd[1]: Stopped kubelet.service. Dec 13 15:58:09.489871 systemd[1]: kubelet.service: Consumed 1.267s CPU time. Dec 13 15:58:09.493711 systemd[1]: Starting kubelet.service... Dec 13 15:58:09.609226 systemd[1]: Started kubelet.service. Dec 13 15:58:09.691735 kubelet[1306]: E1213 15:58:09.691679 1306 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:58:09.695918 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:58:09.696058 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:58:12.796173 systemd[1]: Started sshd@3-10.244.97.146:22-139.178.68.195:56330.service. Dec 13 15:58:13.699496 sshd[1314]: Accepted publickey for core from 139.178.68.195 port 56330 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:13.703625 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:13.713634 systemd-logind[1187]: New session 4 of user core. Dec 13 15:58:13.714856 systemd[1]: Started session-4.scope. Dec 13 15:58:14.332718 sshd[1314]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:14.340652 systemd-logind[1187]: Session 4 logged out. Waiting for processes to exit. Dec 13 15:58:14.342704 systemd[1]: sshd@3-10.244.97.146:22-139.178.68.195:56330.service: Deactivated successfully. Dec 13 15:58:14.344156 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 15:58:14.345242 systemd-logind[1187]: Removed session 4. Dec 13 15:58:14.485651 systemd[1]: Started sshd@4-10.244.97.146:22-139.178.68.195:56332.service. Dec 13 15:58:15.387664 sshd[1320]: Accepted publickey for core from 139.178.68.195 port 56332 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:15.392463 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:15.402313 systemd-logind[1187]: New session 5 of user core. Dec 13 15:58:15.403221 systemd[1]: Started session-5.scope. Dec 13 15:58:16.009296 sshd[1320]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:16.019077 systemd[1]: sshd@4-10.244.97.146:22-139.178.68.195:56332.service: Deactivated successfully. Dec 13 15:58:16.024672 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 15:58:16.025761 systemd-logind[1187]: Session 5 logged out. Waiting for processes to exit. Dec 13 15:58:16.027650 systemd-logind[1187]: Removed session 5. Dec 13 15:58:16.157939 systemd[1]: Started sshd@5-10.244.97.146:22-139.178.68.195:56340.service. Dec 13 15:58:17.066459 sshd[1326]: Accepted publickey for core from 139.178.68.195 port 56340 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:17.070073 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:17.080820 systemd-logind[1187]: New session 6 of user core. Dec 13 15:58:17.082430 systemd[1]: Started session-6.scope. Dec 13 15:58:17.692707 sshd[1326]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:17.699709 systemd-logind[1187]: Session 6 logged out. Waiting for processes to exit. Dec 13 15:58:17.700269 systemd[1]: sshd@5-10.244.97.146:22-139.178.68.195:56340.service: Deactivated successfully. Dec 13 15:58:17.701878 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 15:58:17.704205 systemd-logind[1187]: Removed session 6. Dec 13 15:58:17.845453 systemd[1]: Started sshd@6-10.244.97.146:22-139.178.68.195:50768.service. Dec 13 15:58:18.739306 sshd[1332]: Accepted publickey for core from 139.178.68.195 port 50768 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:18.743743 sshd[1332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:18.753926 systemd-logind[1187]: New session 7 of user core. Dec 13 15:58:18.754073 systemd[1]: Started session-7.scope. Dec 13 15:58:19.230188 sudo[1335]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 15:58:19.230434 sudo[1335]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:58:19.240791 dbus-daemon[1180]: \xd0M\xc8\xd1\u000dV: received setenforce notice (enforcing=406364784) Dec 13 15:58:19.244425 sudo[1335]: pam_unix(sudo:session): session closed for user root Dec 13 15:58:19.389754 sshd[1332]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:19.397819 systemd[1]: sshd@6-10.244.97.146:22-139.178.68.195:50768.service: Deactivated successfully. Dec 13 15:58:19.399754 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 15:58:19.400652 systemd-logind[1187]: Session 7 logged out. Waiting for processes to exit. Dec 13 15:58:19.402171 systemd-logind[1187]: Removed session 7. Dec 13 15:58:19.541996 systemd[1]: Started sshd@7-10.244.97.146:22-139.178.68.195:50780.service. Dec 13 15:58:19.739126 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 15:58:19.739719 systemd[1]: Stopped kubelet.service. Dec 13 15:58:19.743617 systemd[1]: Starting kubelet.service... Dec 13 15:58:19.840988 systemd[1]: Started kubelet.service. Dec 13 15:58:19.900956 kubelet[1345]: E1213 15:58:19.900908 1345 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:58:19.903676 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:58:19.903843 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:58:20.439456 sshd[1339]: Accepted publickey for core from 139.178.68.195 port 50780 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:20.443443 sshd[1339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:20.450929 systemd[1]: Started session-8.scope. Dec 13 15:58:20.451436 systemd-logind[1187]: New session 8 of user core. Dec 13 15:58:20.926129 sudo[1353]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 15:58:20.927191 sudo[1353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:58:20.933017 sudo[1353]: pam_unix(sudo:session): session closed for user root Dec 13 15:58:20.943083 sudo[1352]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 15:58:20.943369 sudo[1352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:58:20.954748 systemd[1]: Stopping audit-rules.service... Dec 13 15:58:20.955000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:58:20.958754 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 15:58:20.958936 kernel: audit: type=1305 audit(1734105500.955:215): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:58:20.955000 audit[1356]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc386a7d0 a2=420 a3=0 items=0 ppid=1 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:20.961462 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 15:58:20.963859 auditctl[1356]: No rules Dec 13 15:58:20.961705 systemd[1]: Stopped audit-rules.service. Dec 13 15:58:20.964805 kernel: audit: type=1300 audit(1734105500.955:215): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc386a7d0 a2=420 a3=0 items=0 ppid=1 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:20.965312 systemd[1]: Starting audit-rules.service... Dec 13 15:58:20.955000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:58:20.970719 kernel: audit: type=1327 audit(1734105500.955:215): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:58:20.970769 kernel: audit: type=1131 audit(1734105500.961:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:20.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:20.986295 augenrules[1373]: No rules Dec 13 15:58:20.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:20.987270 systemd[1]: Finished audit-rules.service. Dec 13 15:58:20.988454 sudo[1352]: pam_unix(sudo:session): session closed for user root Dec 13 15:58:20.987000 audit[1352]: USER_END pid=1352 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:58:20.995722 kernel: audit: type=1130 audit(1734105500.986:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:20.995917 kernel: audit: type=1106 audit(1734105500.987:218): pid=1352 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:58:20.995956 kernel: audit: type=1104 audit(1734105500.988:219): pid=1352 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:58:20.988000 audit[1352]: CRED_DISP pid=1352 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:58:21.136138 sshd[1339]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:21.138000 audit[1339]: USER_END pid=1339 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:21.147543 kernel: audit: type=1106 audit(1734105501.138:220): pid=1339 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:21.138000 audit[1339]: CRED_DISP pid=1339 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:21.147689 systemd[1]: sshd@7-10.244.97.146:22-139.178.68.195:50780.service: Deactivated successfully. Dec 13 15:58:21.148799 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 15:58:21.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.97.146:22-139.178.68.195:50780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:21.156771 kernel: audit: type=1104 audit(1734105501.138:221): pid=1339 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:21.156969 kernel: audit: type=1131 audit(1734105501.147:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.97.146:22-139.178.68.195:50780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:21.156835 systemd-logind[1187]: Session 8 logged out. Waiting for processes to exit. Dec 13 15:58:21.158515 systemd-logind[1187]: Removed session 8. Dec 13 15:58:21.286752 systemd[1]: Started sshd@8-10.244.97.146:22-139.178.68.195:50792.service. Dec 13 15:58:21.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.97.146:22-139.178.68.195:50792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:22.174000 audit[1379]: USER_ACCT pid=1379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:22.175898 sshd[1379]: Accepted publickey for core from 139.178.68.195 port 50792 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:22.177000 audit[1379]: CRED_ACQ pid=1379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:22.177000 audit[1379]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffe46b3a0 a2=3 a3=0 items=0 ppid=1 pid=1379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:22.177000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:22.178544 sshd[1379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:22.185043 systemd[1]: Started session-9.scope. Dec 13 15:58:22.185494 systemd-logind[1187]: New session 9 of user core. Dec 13 15:58:22.193000 audit[1379]: USER_START pid=1379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:22.194000 audit[1381]: CRED_ACQ pid=1381 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:22.655000 audit[1382]: USER_ACCT pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:58:22.655000 audit[1382]: CRED_REFR pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:58:22.656082 sudo[1382]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 15:58:22.656394 sudo[1382]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:58:22.659000 audit[1382]: USER_START pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:58:22.685472 systemd[1]: Starting coreos-metadata.service... Dec 13 15:58:28.777171 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 15:58:28.788236 kernel: kauditd_printk_skb: 11 callbacks suppressed Dec 13 15:58:28.788422 kernel: audit: type=1131 audit(1734105508.776:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:28.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:28.799000 audit: BPF prog-id=43 op=UNLOAD Dec 13 15:58:28.799000 audit: BPF prog-id=42 op=UNLOAD Dec 13 15:58:28.802660 kernel: audit: type=1334 audit(1734105508.799:233): prog-id=43 op=UNLOAD Dec 13 15:58:28.802765 kernel: audit: type=1334 audit(1734105508.799:234): prog-id=42 op=UNLOAD Dec 13 15:58:28.802838 kernel: audit: type=1334 audit(1734105508.799:235): prog-id=41 op=UNLOAD Dec 13 15:58:28.799000 audit: BPF prog-id=41 op=UNLOAD Dec 13 15:58:29.746819 coreos-metadata[1386]: Dec 13 15:58:29.746 WARN failed to locate config-drive, using the metadata service API instead Dec 13 15:58:29.791074 coreos-metadata[1386]: Dec 13 15:58:29.790 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 15:58:29.793491 coreos-metadata[1386]: Dec 13 15:58:29.793 INFO Fetch successful Dec 13 15:58:29.793848 coreos-metadata[1386]: Dec 13 15:58:29.793 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Dec 13 15:58:29.808539 coreos-metadata[1386]: Dec 13 15:58:29.808 INFO Fetch successful Dec 13 15:58:29.809246 coreos-metadata[1386]: Dec 13 15:58:29.808 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Dec 13 15:58:29.825909 coreos-metadata[1386]: Dec 13 15:58:29.825 INFO Fetch successful Dec 13 15:58:29.826364 coreos-metadata[1386]: Dec 13 15:58:29.826 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Dec 13 15:58:29.843955 coreos-metadata[1386]: Dec 13 15:58:29.843 INFO Fetch successful Dec 13 15:58:29.844430 coreos-metadata[1386]: Dec 13 15:58:29.844 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Dec 13 15:58:29.863725 coreos-metadata[1386]: Dec 13 15:58:29.863 INFO Fetch successful Dec 13 15:58:29.886015 systemd[1]: Finished coreos-metadata.service. Dec 13 15:58:29.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:29.894559 kernel: audit: type=1130 audit(1734105509.886:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:29.989096 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 15:58:29.989591 systemd[1]: Stopped kubelet.service. Dec 13 15:58:29.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:30.003335 kernel: audit: type=1130 audit(1734105509.989:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:29.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:30.005979 systemd[1]: Starting kubelet.service... Dec 13 15:58:30.011103 kernel: audit: type=1131 audit(1734105509.989:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:30.104196 systemd[1]: Started kubelet.service. Dec 13 15:58:30.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:30.107550 kernel: audit: type=1130 audit(1734105510.103:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:30.187909 kubelet[1411]: E1213 15:58:30.187851 1411 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:58:30.190868 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:58:30.191030 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:58:30.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:58:30.195536 kernel: audit: type=1131 audit(1734105510.189:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:58:30.704834 systemd[1]: Stopped kubelet.service. Dec 13 15:58:30.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:30.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:30.711531 kernel: audit: type=1130 audit(1734105510.704:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:30.714191 systemd[1]: Starting kubelet.service... Dec 13 15:58:30.740172 systemd[1]: Reloading. Dec 13 15:58:30.840130 /usr/lib/systemd/system-generators/torcx-generator[1464]: time="2024-12-13T15:58:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:58:30.840159 /usr/lib/systemd/system-generators/torcx-generator[1464]: time="2024-12-13T15:58:30Z" level=info msg="torcx already run" Dec 13 15:58:30.932119 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:58:30.932464 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:58:30.952450 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit: BPF prog-id=46 op=LOAD Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.025000 audit: BPF prog-id=47 op=LOAD Dec 13 15:58:31.025000 audit: BPF prog-id=27 op=UNLOAD Dec 13 15:58:31.025000 audit: BPF prog-id=28 op=UNLOAD Dec 13 15:58:31.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.026000 audit: BPF prog-id=48 op=LOAD Dec 13 15:58:31.026000 audit: BPF prog-id=29 op=UNLOAD Dec 13 15:58:31.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit: BPF prog-id=49 op=LOAD Dec 13 15:58:31.028000 audit: BPF prog-id=30 op=UNLOAD Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit: BPF prog-id=50 op=LOAD Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.028000 audit: BPF prog-id=51 op=LOAD Dec 13 15:58:31.028000 audit: BPF prog-id=31 op=UNLOAD Dec 13 15:58:31.028000 audit: BPF prog-id=32 op=UNLOAD Dec 13 15:58:31.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.030000 audit: BPF prog-id=52 op=LOAD Dec 13 15:58:31.030000 audit: BPF prog-id=44 op=UNLOAD Dec 13 15:58:31.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.032000 audit: BPF prog-id=53 op=LOAD Dec 13 15:58:31.032000 audit: BPF prog-id=36 op=UNLOAD Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit: BPF prog-id=54 op=LOAD Dec 13 15:58:31.035000 audit: BPF prog-id=38 op=UNLOAD Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit: BPF prog-id=55 op=LOAD Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.035000 audit: BPF prog-id=56 op=LOAD Dec 13 15:58:31.035000 audit: BPF prog-id=39 op=UNLOAD Dec 13 15:58:31.035000 audit: BPF prog-id=40 op=UNLOAD Dec 13 15:58:31.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.037000 audit: BPF prog-id=57 op=LOAD Dec 13 15:58:31.038000 audit: BPF prog-id=33 op=UNLOAD Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit: BPF prog-id=58 op=LOAD Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit: BPF prog-id=59 op=LOAD Dec 13 15:58:31.038000 audit: BPF prog-id=34 op=UNLOAD Dec 13 15:58:31.038000 audit: BPF prog-id=35 op=UNLOAD Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.038000 audit: BPF prog-id=60 op=LOAD Dec 13 15:58:31.038000 audit: BPF prog-id=37 op=UNLOAD Dec 13 15:58:31.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:31.057293 systemd[1]: Started kubelet.service. Dec 13 15:58:31.059105 systemd[1]: Stopping kubelet.service... Dec 13 15:58:31.059361 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 15:58:31.060059 systemd[1]: Stopped kubelet.service. Dec 13 15:58:31.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:31.062206 systemd[1]: Starting kubelet.service... Dec 13 15:58:31.155678 systemd[1]: Started kubelet.service. Dec 13 15:58:31.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:31.219615 kubelet[1515]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:58:31.220058 kubelet[1515]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:58:31.220126 kubelet[1515]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:58:31.221684 kubelet[1515]: I1213 15:58:31.221631 1515 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:58:31.676367 kubelet[1515]: I1213 15:58:31.676315 1515 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 15:58:31.676757 kubelet[1515]: I1213 15:58:31.676731 1515 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:58:31.677276 kubelet[1515]: I1213 15:58:31.677252 1515 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 15:58:31.708039 kubelet[1515]: I1213 15:58:31.708010 1515 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:58:31.718675 kubelet[1515]: I1213 15:58:31.718629 1515 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:58:31.718963 kubelet[1515]: I1213 15:58:31.718940 1515 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:58:31.719142 kubelet[1515]: I1213 15:58:31.719124 1515 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:58:31.719315 kubelet[1515]: I1213 15:58:31.719180 1515 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:58:31.719315 kubelet[1515]: I1213 15:58:31.719191 1515 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:58:31.719375 kubelet[1515]: I1213 15:58:31.719322 1515 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:58:31.719482 kubelet[1515]: I1213 15:58:31.719469 1515 kubelet.go:396] "Attempting to sync node with API server" Dec 13 15:58:31.719541 kubelet[1515]: I1213 15:58:31.719488 1515 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:58:31.719579 kubelet[1515]: I1213 15:58:31.719540 1515 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:58:31.719579 kubelet[1515]: I1213 15:58:31.719559 1515 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:58:31.720329 kubelet[1515]: E1213 15:58:31.720310 1515 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:31.720482 kubelet[1515]: E1213 15:58:31.720469 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:31.721020 kubelet[1515]: I1213 15:58:31.721003 1515 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:58:31.724120 kubelet[1515]: I1213 15:58:31.724094 1515 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:58:31.724195 kubelet[1515]: W1213 15:58:31.724186 1515 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 15:58:31.725040 kubelet[1515]: I1213 15:58:31.725020 1515 server.go:1256] "Started kubelet" Dec 13 15:58:31.725000 audit[1515]: AVC avc: denied { mac_admin } for pid=1515 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.725000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:58:31.725000 audit[1515]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aaad20 a1=c000a82810 a2=c000aaacf0 a3=25 items=0 ppid=1 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.725000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:58:31.725000 audit[1515]: AVC avc: denied { mac_admin } for pid=1515 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.725000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:58:31.725000 audit[1515]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00015b3a0 a1=c000a82828 a2=c000aaadb0 a3=25 items=0 ppid=1 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.725000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:58:31.726364 kubelet[1515]: I1213 15:58:31.725980 1515 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:58:31.726364 kubelet[1515]: I1213 15:58:31.726023 1515 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:58:31.726364 kubelet[1515]: I1213 15:58:31.726111 1515 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:58:31.726364 kubelet[1515]: I1213 15:58:31.726263 1515 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:58:31.727150 kubelet[1515]: I1213 15:58:31.727120 1515 server.go:461] "Adding debug handlers to kubelet server" Dec 13 15:58:31.728265 kubelet[1515]: I1213 15:58:31.728243 1515 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:58:31.728415 kubelet[1515]: I1213 15:58:31.728400 1515 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:58:31.741454 kubelet[1515]: I1213 15:58:31.741435 1515 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:58:31.741706 kubelet[1515]: I1213 15:58:31.741691 1515 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 15:58:31.741852 kubelet[1515]: I1213 15:58:31.741842 1515 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 15:58:31.745057 kubelet[1515]: E1213 15:58:31.745038 1515 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 15:58:31.745228 kubelet[1515]: E1213 15:58:31.745217 1515 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.97.146.1810c7c6756a3a48 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.97.146,UID:10.244.97.146,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.244.97.146,},FirstTimestamp:2024-12-13 15:58:31.724989 +0000 UTC m=+0.563164216,LastTimestamp:2024-12-13 15:58:31.724989 +0000 UTC m=+0.563164216,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.97.146,}" Dec 13 15:58:31.745620 kubelet[1515]: W1213 15:58:31.745602 1515 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.244.97.146" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 15:58:31.745729 kubelet[1515]: E1213 15:58:31.745717 1515 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.244.97.146" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 15:58:31.745900 kubelet[1515]: W1213 15:58:31.745882 1515 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 15:58:31.745991 kubelet[1515]: E1213 15:58:31.745982 1515 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 15:58:31.746472 kubelet[1515]: I1213 15:58:31.746448 1515 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:58:31.746633 kubelet[1515]: I1213 15:58:31.746617 1515 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:58:31.747449 kubelet[1515]: W1213 15:58:31.747433 1515 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 15:58:31.747579 kubelet[1515]: E1213 15:58:31.747568 1515 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 15:58:31.747860 kubelet[1515]: I1213 15:58:31.747846 1515 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:58:31.771853 kubelet[1515]: E1213 15:58:31.771825 1515 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.244.97.146\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 15:58:31.772270 kubelet[1515]: E1213 15:58:31.772251 1515 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.97.146.1810c7c6769bfb76 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.97.146,UID:10.244.97.146,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.244.97.146,},FirstTimestamp:2024-12-13 15:58:31.745026934 +0000 UTC m=+0.583202168,LastTimestamp:2024-12-13 15:58:31.745026934 +0000 UTC m=+0.583202168,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.97.146,}" Dec 13 15:58:31.772880 kubelet[1515]: I1213 15:58:31.772863 1515 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:58:31.772985 kubelet[1515]: I1213 15:58:31.772975 1515 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:58:31.773054 kubelet[1515]: I1213 15:58:31.773045 1515 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:58:31.774287 kubelet[1515]: I1213 15:58:31.774271 1515 policy_none.go:49] "None policy: Start" Dec 13 15:58:31.774904 kubelet[1515]: I1213 15:58:31.774888 1515 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:58:31.775014 kubelet[1515]: I1213 15:58:31.775004 1515 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:58:31.785710 systemd[1]: Created slice kubepods.slice. Dec 13 15:58:31.787000 audit[1526]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1526 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:31.787000 audit[1526]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9e3b5e30 a2=0 a3=7fff9e3b5e1c items=0 ppid=1515 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:58:31.789000 audit[1531]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:31.789000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd13ee4660 a2=0 a3=7ffd13ee464c items=0 ppid=1515 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:58:31.793189 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 15:58:31.796457 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 15:58:31.801212 kubelet[1515]: I1213 15:58:31.801191 1515 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:58:31.800000 audit[1515]: AVC avc: denied { mac_admin } for pid=1515 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:31.800000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:58:31.800000 audit[1515]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b48db0 a1=c000e5f128 a2=c000b48d50 a3=25 items=0 ppid=1 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.800000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:58:31.801915 kubelet[1515]: I1213 15:58:31.801902 1515 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:58:31.802188 kubelet[1515]: I1213 15:58:31.802175 1515 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:58:31.804879 kubelet[1515]: E1213 15:58:31.804859 1515 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.244.97.146\" not found" Dec 13 15:58:31.797000 audit[1534]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1534 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:31.797000 audit[1534]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff99da1970 a2=0 a3=7fff99da195c items=0 ppid=1515 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:58:31.817000 audit[1539]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:31.817000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd2ca3a3b0 a2=0 a3=7ffd2ca3a39c items=0 ppid=1515 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:58:31.842364 kubelet[1515]: I1213 15:58:31.842319 1515 kubelet_node_status.go:73] "Attempting to register node" node="10.244.97.146" Dec 13 15:58:31.848789 kubelet[1515]: I1213 15:58:31.848764 1515 kubelet_node_status.go:76] "Successfully registered node" node="10.244.97.146" Dec 13 15:58:31.865170 kubelet[1515]: E1213 15:58:31.865136 1515 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.146\" not found" Dec 13 15:58:31.869000 audit[1544]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:31.869000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffad02cc30 a2=0 a3=7fffad02cc1c items=0 ppid=1515 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 15:58:31.871223 kubelet[1515]: I1213 15:58:31.871205 1515 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:58:31.870000 audit[1545]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1545 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:31.870000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcd8ba3640 a2=0 a3=7ffcd8ba362c items=0 ppid=1515 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:58:31.872792 kubelet[1515]: I1213 15:58:31.872769 1515 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:58:31.872854 kubelet[1515]: I1213 15:58:31.872837 1515 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:58:31.872886 kubelet[1515]: I1213 15:58:31.872867 1515 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 15:58:31.873041 kubelet[1515]: E1213 15:58:31.873017 1515 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 15:58:31.873000 audit[1546]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:31.873000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee0f9ad30 a2=0 a3=7ffee0f9ad1c items=0 ppid=1515 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.873000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:58:31.873000 audit[1547]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1547 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:31.873000 audit[1547]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9bf23910 a2=0 a3=7ffe9bf238fc items=0 ppid=1515 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.873000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:58:31.875000 audit[1549]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1549 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:31.875000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc138e6f10 a2=0 a3=7ffc138e6efc items=0 ppid=1515 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:58:31.875000 audit[1548]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:31.875000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffa66b39c0 a2=0 a3=7fffa66b39ac items=0 ppid=1515 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:58:31.876000 audit[1550]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1550 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:31.876000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffedaf81030 a2=0 a3=7ffedaf8101c items=0 ppid=1515 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.876000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:58:31.878000 audit[1551]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:31.878000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec914e930 a2=0 a3=7ffec914e91c items=0 ppid=1515 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:31.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:58:31.966537 kubelet[1515]: E1213 15:58:31.966225 1515 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.146\" not found" Dec 13 15:58:32.067032 kubelet[1515]: E1213 15:58:32.066968 1515 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.146\" not found" Dec 13 15:58:32.168145 kubelet[1515]: E1213 15:58:32.167926 1515 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.146\" not found" Dec 13 15:58:32.269044 kubelet[1515]: E1213 15:58:32.268955 1515 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.146\" not found" Dec 13 15:58:32.370111 kubelet[1515]: E1213 15:58:32.370026 1515 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.146\" not found" Dec 13 15:58:32.471049 kubelet[1515]: E1213 15:58:32.470958 1515 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.146\" not found" Dec 13 15:58:32.572067 kubelet[1515]: E1213 15:58:32.571803 1515 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.146\" not found" Dec 13 15:58:32.674355 kubelet[1515]: E1213 15:58:32.672910 1515 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.146\" not found" Dec 13 15:58:32.686402 kubelet[1515]: I1213 15:58:32.686292 1515 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 15:58:32.686760 kubelet[1515]: W1213 15:58:32.686572 1515 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 15:58:32.691459 sudo[1382]: pam_unix(sudo:session): session closed for user root Dec 13 15:58:32.691000 audit[1382]: USER_END pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:58:32.691000 audit[1382]: CRED_DISP pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:58:32.721225 kubelet[1515]: E1213 15:58:32.721093 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:32.773390 kubelet[1515]: E1213 15:58:32.773326 1515 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.146\" not found" Dec 13 15:58:32.837187 sshd[1379]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:32.840000 audit[1379]: USER_END pid=1379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:32.840000 audit[1379]: CRED_DISP pid=1379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:32.844137 systemd-logind[1187]: Session 9 logged out. Waiting for processes to exit. Dec 13 15:58:32.845875 systemd[1]: sshd@8-10.244.97.146:22-139.178.68.195:50792.service: Deactivated successfully. Dec 13 15:58:32.847377 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 15:58:32.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.97.146:22-139.178.68.195:50792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:32.848761 systemd-logind[1187]: Removed session 9. Dec 13 15:58:32.875177 kubelet[1515]: I1213 15:58:32.875137 1515 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 15:58:32.875776 env[1199]: time="2024-12-13T15:58:32.875651993Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 15:58:32.876179 kubelet[1515]: I1213 15:58:32.875960 1515 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 15:58:33.722035 kubelet[1515]: I1213 15:58:33.721960 1515 apiserver.go:52] "Watching apiserver" Dec 13 15:58:33.723076 kubelet[1515]: E1213 15:58:33.723016 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:33.769434 kubelet[1515]: I1213 15:58:33.769369 1515 topology_manager.go:215] "Topology Admit Handler" podUID="ff02e76e-0863-40d1-a38d-ac080b991379" podNamespace="calico-system" podName="csi-node-driver-2hwng" Dec 13 15:58:33.770053 kubelet[1515]: I1213 15:58:33.770019 1515 topology_manager.go:215] "Topology Admit Handler" podUID="1600c39f-a2c7-497c-893c-bb868e97c4de" podNamespace="kube-system" podName="kube-proxy-c65fm" Dec 13 15:58:33.770543 kubelet[1515]: E1213 15:58:33.770447 1515 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hwng" podUID="ff02e76e-0863-40d1-a38d-ac080b991379" Dec 13 15:58:33.771348 kubelet[1515]: I1213 15:58:33.771239 1515 topology_manager.go:215] "Topology Admit Handler" podUID="10b9512d-2c2e-455d-b6da-c2177a7dba6a" podNamespace="calico-system" podName="calico-node-6xvqf" Dec 13 15:58:33.778118 systemd[1]: Created slice kubepods-besteffort-pod1600c39f_a2c7_497c_893c_bb868e97c4de.slice. Dec 13 15:58:33.788226 systemd[1]: Created slice kubepods-besteffort-pod10b9512d_2c2e_455d_b6da_c2177a7dba6a.slice. Dec 13 15:58:33.842923 kubelet[1515]: I1213 15:58:33.842872 1515 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 15:58:33.855063 kubelet[1515]: I1213 15:58:33.855031 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/10b9512d-2c2e-455d-b6da-c2177a7dba6a-node-certs\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.855276 kubelet[1515]: I1213 15:58:33.855262 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/10b9512d-2c2e-455d-b6da-c2177a7dba6a-var-run-calico\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.855356 kubelet[1515]: I1213 15:58:33.855346 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/10b9512d-2c2e-455d-b6da-c2177a7dba6a-cni-bin-dir\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.855488 kubelet[1515]: I1213 15:58:33.855478 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c4dnt\" (UniqueName: \"kubernetes.io/projected/10b9512d-2c2e-455d-b6da-c2177a7dba6a-kube-api-access-c4dnt\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.855582 kubelet[1515]: I1213 15:58:33.855573 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6n4ct\" (UniqueName: \"kubernetes.io/projected/ff02e76e-0863-40d1-a38d-ac080b991379-kube-api-access-6n4ct\") pod \"csi-node-driver-2hwng\" (UID: \"ff02e76e-0863-40d1-a38d-ac080b991379\") " pod="calico-system/csi-node-driver-2hwng" Dec 13 15:58:33.855732 kubelet[1515]: I1213 15:58:33.855700 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1600c39f-a2c7-497c-893c-bb868e97c4de-xtables-lock\") pod \"kube-proxy-c65fm\" (UID: \"1600c39f-a2c7-497c-893c-bb868e97c4de\") " pod="kube-system/kube-proxy-c65fm" Dec 13 15:58:33.855791 kubelet[1515]: I1213 15:58:33.855778 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qp9qm\" (UniqueName: \"kubernetes.io/projected/1600c39f-a2c7-497c-893c-bb868e97c4de-kube-api-access-qp9qm\") pod \"kube-proxy-c65fm\" (UID: \"1600c39f-a2c7-497c-893c-bb868e97c4de\") " pod="kube-system/kube-proxy-c65fm" Dec 13 15:58:33.855836 kubelet[1515]: I1213 15:58:33.855821 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/10b9512d-2c2e-455d-b6da-c2177a7dba6a-tigera-ca-bundle\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.855871 kubelet[1515]: I1213 15:58:33.855857 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/10b9512d-2c2e-455d-b6da-c2177a7dba6a-var-lib-calico\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.855907 kubelet[1515]: I1213 15:58:33.855893 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/10b9512d-2c2e-455d-b6da-c2177a7dba6a-cni-net-dir\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.855947 kubelet[1515]: I1213 15:58:33.855928 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ff02e76e-0863-40d1-a38d-ac080b991379-kubelet-dir\") pod \"csi-node-driver-2hwng\" (UID: \"ff02e76e-0863-40d1-a38d-ac080b991379\") " pod="calico-system/csi-node-driver-2hwng" Dec 13 15:58:33.855992 kubelet[1515]: I1213 15:58:33.855963 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ff02e76e-0863-40d1-a38d-ac080b991379-registration-dir\") pod \"csi-node-driver-2hwng\" (UID: \"ff02e76e-0863-40d1-a38d-ac080b991379\") " pod="calico-system/csi-node-driver-2hwng" Dec 13 15:58:33.856025 kubelet[1515]: I1213 15:58:33.855998 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1600c39f-a2c7-497c-893c-bb868e97c4de-kube-proxy\") pod \"kube-proxy-c65fm\" (UID: \"1600c39f-a2c7-497c-893c-bb868e97c4de\") " pod="kube-system/kube-proxy-c65fm" Dec 13 15:58:33.856056 kubelet[1515]: I1213 15:58:33.856033 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/10b9512d-2c2e-455d-b6da-c2177a7dba6a-policysync\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.856090 kubelet[1515]: I1213 15:58:33.856070 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/10b9512d-2c2e-455d-b6da-c2177a7dba6a-lib-modules\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.856121 kubelet[1515]: I1213 15:58:33.856104 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/10b9512d-2c2e-455d-b6da-c2177a7dba6a-xtables-lock\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.856159 kubelet[1515]: I1213 15:58:33.856139 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/10b9512d-2c2e-455d-b6da-c2177a7dba6a-flexvol-driver-host\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.856198 kubelet[1515]: I1213 15:58:33.856174 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ff02e76e-0863-40d1-a38d-ac080b991379-varrun\") pod \"csi-node-driver-2hwng\" (UID: \"ff02e76e-0863-40d1-a38d-ac080b991379\") " pod="calico-system/csi-node-driver-2hwng" Dec 13 15:58:33.856230 kubelet[1515]: I1213 15:58:33.856210 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ff02e76e-0863-40d1-a38d-ac080b991379-socket-dir\") pod \"csi-node-driver-2hwng\" (UID: \"ff02e76e-0863-40d1-a38d-ac080b991379\") " pod="calico-system/csi-node-driver-2hwng" Dec 13 15:58:33.856266 kubelet[1515]: I1213 15:58:33.856245 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1600c39f-a2c7-497c-893c-bb868e97c4de-lib-modules\") pod \"kube-proxy-c65fm\" (UID: \"1600c39f-a2c7-497c-893c-bb868e97c4de\") " pod="kube-system/kube-proxy-c65fm" Dec 13 15:58:33.856297 kubelet[1515]: I1213 15:58:33.856278 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/10b9512d-2c2e-455d-b6da-c2177a7dba6a-cni-log-dir\") pod \"calico-node-6xvqf\" (UID: \"10b9512d-2c2e-455d-b6da-c2177a7dba6a\") " pod="calico-system/calico-node-6xvqf" Dec 13 15:58:33.970810 kubelet[1515]: E1213 15:58:33.970768 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:33.970810 kubelet[1515]: W1213 15:58:33.970792 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:33.970810 kubelet[1515]: E1213 15:58:33.970817 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:34.026245 kubelet[1515]: E1213 15:58:34.026219 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:34.026245 kubelet[1515]: W1213 15:58:34.026236 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:34.026430 kubelet[1515]: E1213 15:58:34.026268 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:34.026557 kubelet[1515]: E1213 15:58:34.026498 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:34.026607 kubelet[1515]: W1213 15:58:34.026558 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:34.026607 kubelet[1515]: E1213 15:58:34.026576 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:34.035093 kubelet[1515]: E1213 15:58:34.035070 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:34.035093 kubelet[1515]: W1213 15:58:34.035086 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:34.035093 kubelet[1515]: E1213 15:58:34.035100 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:34.089955 env[1199]: time="2024-12-13T15:58:34.088679874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-c65fm,Uid:1600c39f-a2c7-497c-893c-bb868e97c4de,Namespace:kube-system,Attempt:0,}" Dec 13 15:58:34.092156 env[1199]: time="2024-12-13T15:58:34.091308230Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6xvqf,Uid:10b9512d-2c2e-455d-b6da-c2177a7dba6a,Namespace:calico-system,Attempt:0,}" Dec 13 15:58:34.723792 kubelet[1515]: E1213 15:58:34.723712 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:34.852281 env[1199]: time="2024-12-13T15:58:34.852222704Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:34.853223 env[1199]: time="2024-12-13T15:58:34.853192654Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:34.854049 env[1199]: time="2024-12-13T15:58:34.854023403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:34.856380 env[1199]: time="2024-12-13T15:58:34.856355989Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:34.859856 env[1199]: time="2024-12-13T15:58:34.859795011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:34.866058 env[1199]: time="2024-12-13T15:58:34.866026797Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:34.868563 env[1199]: time="2024-12-13T15:58:34.868531199Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:34.869741 env[1199]: time="2024-12-13T15:58:34.869711201Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:34.881321 env[1199]: time="2024-12-13T15:58:34.881183077Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:58:34.881321 env[1199]: time="2024-12-13T15:58:34.881288309Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:58:34.881571 env[1199]: time="2024-12-13T15:58:34.881301540Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:58:34.882656 env[1199]: time="2024-12-13T15:58:34.882614219Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1118d3a78125fad8f3dd2df87b75f3fbdeae488b97b6081f50cb16173647ca4a pid=1579 runtime=io.containerd.runc.v2 Dec 13 15:58:34.885149 env[1199]: time="2024-12-13T15:58:34.885090838Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:58:34.885260 env[1199]: time="2024-12-13T15:58:34.885157046Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:58:34.885260 env[1199]: time="2024-12-13T15:58:34.885180263Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:58:34.885342 env[1199]: time="2024-12-13T15:58:34.885314055Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/099ba875d7588ad044c3535a4e391e07dbc690e51c9c1587c54241209eca5328 pid=1582 runtime=io.containerd.runc.v2 Dec 13 15:58:34.906841 systemd[1]: Started cri-containerd-1118d3a78125fad8f3dd2df87b75f3fbdeae488b97b6081f50cb16173647ca4a.scope. Dec 13 15:58:34.914916 systemd[1]: Started cri-containerd-099ba875d7588ad044c3535a4e391e07dbc690e51c9c1587c54241209eca5328.scope. Dec 13 15:58:34.930717 kernel: kauditd_printk_skb: 229 callbacks suppressed Dec 13 15:58:34.930830 kernel: audit: type=1400 audit(1734105514.925:438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.937698 kernel: audit: type=1400 audit(1734105514.925:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.937792 kernel: audit: type=1400 audit(1734105514.925:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.942585 kernel: audit: type=1400 audit(1734105514.925:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.950106 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:58:34.950196 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 15:58:34.950223 kernel: audit: backlog limit exceeded Dec 13 15:58:34.950248 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:58:34.950290 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 15:58:34.950314 kernel: audit: backlog limit exceeded Dec 13 15:58:34.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.925000 audit: BPF prog-id=61 op=LOAD Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1579 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313864336137383132356661643866336464326466383762373566 Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1579 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313864336137383132356661643866336464326466383762373566 Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.930000 audit: BPF prog-id=62 op=LOAD Dec 13 15:58:34.930000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000247c30 items=0 ppid=1579 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313864336137383132356661643866336464326466383762373566 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit: BPF prog-id=63 op=LOAD Dec 13 15:58:34.931000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000247c78 items=0 ppid=1579 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313864336137383132356661643866336464326466383762373566 Dec 13 15:58:34.931000 audit: BPF prog-id=63 op=UNLOAD Dec 13 15:58:34.931000 audit: BPF prog-id=62 op=UNLOAD Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.931000 audit: BPF prog-id=64 op=LOAD Dec 13 15:58:34.931000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000390088 items=0 ppid=1579 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313864336137383132356661643866336464326466383762373566 Dec 13 15:58:34.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.949000 audit: BPF prog-id=65 op=LOAD Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1582 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039396261383735643735383861643034346333353335613465333931 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1582 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039396261383735643735383861643034346333353335613465333931 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit: BPF prog-id=66 op=LOAD Dec 13 15:58:34.952000 audit[1605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c9eb0 items=0 ppid=1582 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039396261383735643735383861643034346333353335613465333931 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit: BPF prog-id=67 op=LOAD Dec 13 15:58:34.952000 audit[1605]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c9ef8 items=0 ppid=1582 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039396261383735643735383861643034346333353335613465333931 Dec 13 15:58:34.952000 audit: BPF prog-id=67 op=UNLOAD Dec 13 15:58:34.952000 audit: BPF prog-id=66 op=UNLOAD Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:34.952000 audit: BPF prog-id=68 op=LOAD Dec 13 15:58:34.952000 audit[1605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000394308 items=0 ppid=1582 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039396261383735643735383861643034346333353335613465333931 Dec 13 15:58:34.970879 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount450827902.mount: Deactivated successfully. Dec 13 15:58:34.981656 env[1199]: time="2024-12-13T15:58:34.979144600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-c65fm,Uid:1600c39f-a2c7-497c-893c-bb868e97c4de,Namespace:kube-system,Attempt:0,} returns sandbox id \"1118d3a78125fad8f3dd2df87b75f3fbdeae488b97b6081f50cb16173647ca4a\"" Dec 13 15:58:34.984529 env[1199]: time="2024-12-13T15:58:34.984477354Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6xvqf,Uid:10b9512d-2c2e-455d-b6da-c2177a7dba6a,Namespace:calico-system,Attempt:0,} returns sandbox id \"099ba875d7588ad044c3535a4e391e07dbc690e51c9c1587c54241209eca5328\"" Dec 13 15:58:34.985549 env[1199]: time="2024-12-13T15:58:34.985492083Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 15:58:35.724832 kubelet[1515]: E1213 15:58:35.724777 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:35.874965 kubelet[1515]: E1213 15:58:35.873990 1515 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hwng" podUID="ff02e76e-0863-40d1-a38d-ac080b991379" Dec 13 15:58:36.310122 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3688413974.mount: Deactivated successfully. Dec 13 15:58:36.726101 kubelet[1515]: E1213 15:58:36.725568 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:36.950023 env[1199]: time="2024-12-13T15:58:36.949954073Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:36.952224 env[1199]: time="2024-12-13T15:58:36.952183884Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:36.954884 env[1199]: time="2024-12-13T15:58:36.954845202Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:36.955980 env[1199]: time="2024-12-13T15:58:36.955943933Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:36.956818 env[1199]: time="2024-12-13T15:58:36.956784059Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 15:58:36.959335 env[1199]: time="2024-12-13T15:58:36.959265152Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 15:58:36.960852 env[1199]: time="2024-12-13T15:58:36.960817644Z" level=info msg="CreateContainer within sandbox \"1118d3a78125fad8f3dd2df87b75f3fbdeae488b97b6081f50cb16173647ca4a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 15:58:36.971217 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2178805167.mount: Deactivated successfully. Dec 13 15:58:36.975714 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3876687458.mount: Deactivated successfully. Dec 13 15:58:36.980322 env[1199]: time="2024-12-13T15:58:36.980285138Z" level=info msg="CreateContainer within sandbox \"1118d3a78125fad8f3dd2df87b75f3fbdeae488b97b6081f50cb16173647ca4a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"573da0ad558c523a44cbc667dbdf2ac1693e4d61801d304cfd04ca545f66684c\"" Dec 13 15:58:36.980944 env[1199]: time="2024-12-13T15:58:36.980913382Z" level=info msg="StartContainer for \"573da0ad558c523a44cbc667dbdf2ac1693e4d61801d304cfd04ca545f66684c\"" Dec 13 15:58:37.000389 systemd[1]: Started cri-containerd-573da0ad558c523a44cbc667dbdf2ac1693e4d61801d304cfd04ca545f66684c.scope. Dec 13 15:58:37.020000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.020000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f6e69f76e48 items=0 ppid=1579 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336461306164353538633532336134346362633636376462646632 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit: BPF prog-id=69 op=LOAD Dec 13 15:58:37.022000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c00039e5b8 items=0 ppid=1579 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336461306164353538633532336134346362633636376462646632 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.022000 audit: BPF prog-id=70 op=LOAD Dec 13 15:58:37.022000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c00039e608 items=0 ppid=1579 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336461306164353538633532336134346362633636376462646632 Dec 13 15:58:37.022000 audit: BPF prog-id=70 op=UNLOAD Dec 13 15:58:37.023000 audit: BPF prog-id=69 op=UNLOAD Dec 13 15:58:37.023000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.023000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.023000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.023000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.023000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.023000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.023000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.023000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.023000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.023000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:37.023000 audit: BPF prog-id=71 op=LOAD Dec 13 15:58:37.023000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c00039e698 items=0 ppid=1579 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336461306164353538633532336134346362633636376462646632 Dec 13 15:58:37.046967 env[1199]: time="2024-12-13T15:58:37.046905422Z" level=info msg="StartContainer for \"573da0ad558c523a44cbc667dbdf2ac1693e4d61801d304cfd04ca545f66684c\" returns successfully" Dec 13 15:58:37.131000 audit[1709]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.131000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd71b3d5f0 a2=0 a3=7ffd71b3d5dc items=0 ppid=1668 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:58:37.133000 audit[1711]: NETFILTER_CFG table=nat:15 family=10 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.133000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca4eb5ec0 a2=0 a3=7ffca4eb5eac items=0 ppid=1668 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.133000 audit[1710]: NETFILTER_CFG table=mangle:16 family=2 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.133000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf03c4530 a2=0 a3=7ffdf03c451c items=0 ppid=1668 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:58:37.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:58:37.135000 audit[1713]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.135000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefe493940 a2=0 a3=7ffefe49392c items=0 ppid=1668 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.135000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:58:37.135000 audit[1712]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.135000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdc2fae70 a2=0 a3=7ffcdc2fae5c items=0 ppid=1668 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.135000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:58:37.137000 audit[1714]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.137000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd006f3300 a2=0 a3=7ffd006f32ec items=0 ppid=1668 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:58:37.234000 audit[1715]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.234000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe092801c0 a2=0 a3=7ffe092801ac items=0 ppid=1668 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:58:37.244000 audit[1717]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.244000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffde8e38340 a2=0 a3=7ffde8e3832c items=0 ppid=1668 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 15:58:37.249000 audit[1720]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.249000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe297c75f0 a2=0 a3=7ffe297c75dc items=0 ppid=1668 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.249000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 15:58:37.251000 audit[1721]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.251000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9ef41cd0 a2=0 a3=7fff9ef41cbc items=0 ppid=1668 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:58:37.254000 audit[1723]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.254000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7f7485e0 a2=0 a3=7ffd7f7485cc items=0 ppid=1668 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:58:37.256000 audit[1724]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.256000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf5a24690 a2=0 a3=7ffcf5a2467c items=0 ppid=1668 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:58:37.259000 audit[1726]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.259000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdadd2f080 a2=0 a3=7ffdadd2f06c items=0 ppid=1668 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:58:37.263000 audit[1729]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.263000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff77b0e2a0 a2=0 a3=7fff77b0e28c items=0 ppid=1668 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 15:58:37.265000 audit[1730]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.265000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcc038d40 a2=0 a3=7fffcc038d2c items=0 ppid=1668 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:58:37.268000 audit[1732]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.268000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc000d34c0 a2=0 a3=7ffc000d34ac items=0 ppid=1668 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:58:37.269000 audit[1733]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.269000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9b45aa00 a2=0 a3=7fff9b45a9ec items=0 ppid=1668 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:58:37.272000 audit[1735]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.272000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe835bfd70 a2=0 a3=7ffe835bfd5c items=0 ppid=1668 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:58:37.277000 audit[1738]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.277000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe8737c3e0 a2=0 a3=7ffe8737c3cc items=0 ppid=1668 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:58:37.283000 audit[1741]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.283000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc110baa70 a2=0 a3=7ffc110baa5c items=0 ppid=1668 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:58:37.284000 audit[1742]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.284000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc97ed1a60 a2=0 a3=7ffc97ed1a4c items=0 ppid=1668 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.284000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:58:37.291000 audit[1744]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.291000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcbd632e30 a2=0 a3=7ffcbd632e1c items=0 ppid=1668 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:58:37.335000 audit[1749]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.335000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe78b02c80 a2=0 a3=7ffe78b02c6c items=0 ppid=1668 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:58:37.339000 audit[1750]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.339000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff0b081d0 a2=0 a3=7ffff0b081bc items=0 ppid=1668 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:58:37.343000 audit[1752]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:58:37.343000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff8b2efb00 a2=0 a3=7fff8b2efaec items=0 ppid=1668 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:58:37.365000 audit[1758]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:37.365000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffde4dc00b0 a2=0 a3=7ffde4dc009c items=0 ppid=1668 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:37.405000 audit[1758]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:37.405000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffde4dc00b0 a2=0 a3=7ffde4dc009c items=0 ppid=1668 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:37.418000 audit[1766]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.418000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc3e846ed0 a2=0 a3=7ffc3e846ebc items=0 ppid=1668 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:58:37.422000 audit[1768]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.422000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdd8481360 a2=0 a3=7ffdd848134c items=0 ppid=1668 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 15:58:37.427000 audit[1771]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.427000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc22ffca80 a2=0 a3=7ffc22ffca6c items=0 ppid=1668 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 15:58:37.428000 audit[1772]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.428000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee66f3780 a2=0 a3=7ffee66f376c items=0 ppid=1668 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:58:37.431000 audit[1774]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.431000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff9f5e9600 a2=0 a3=7fff9f5e95ec items=0 ppid=1668 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:58:37.433000 audit[1775]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.433000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffde92ef70 a2=0 a3=7fffde92ef5c items=0 ppid=1668 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:58:37.436000 audit[1777]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.436000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca9076890 a2=0 a3=7ffca907687c items=0 ppid=1668 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 15:58:37.442000 audit[1780]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.442000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd15082530 a2=0 a3=7ffd1508251c items=0 ppid=1668 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:58:37.444000 audit[1781]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.444000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff76c084b0 a2=0 a3=7fff76c0849c items=0 ppid=1668 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:58:37.447000 audit[1783]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.447000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3d851920 a2=0 a3=7ffd3d85190c items=0 ppid=1668 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:58:37.448000 audit[1784]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.448000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff77144ed0 a2=0 a3=7fff77144ebc items=0 ppid=1668 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.448000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:58:37.451000 audit[1786]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.451000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce59e0020 a2=0 a3=7ffce59e000c items=0 ppid=1668 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:58:37.455000 audit[1789]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.455000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeff211f90 a2=0 a3=7ffeff211f7c items=0 ppid=1668 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:58:37.460000 audit[1792]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.460000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb46d8c90 a2=0 a3=7ffeb46d8c7c items=0 ppid=1668 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 15:58:37.461000 audit[1793]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.461000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde2016950 a2=0 a3=7ffde201693c items=0 ppid=1668 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:58:37.464000 audit[1795]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.464000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcec6c1260 a2=0 a3=7ffcec6c124c items=0 ppid=1668 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:58:37.469000 audit[1798]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.469000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffc6f2ffd0 a2=0 a3=7fffc6f2ffbc items=0 ppid=1668 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.469000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:58:37.470000 audit[1799]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.470000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc83e8a660 a2=0 a3=7ffc83e8a64c items=0 ppid=1668 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.470000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:58:37.473000 audit[1801]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.473000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc04a95070 a2=0 a3=7ffc04a9505c items=0 ppid=1668 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.473000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:58:37.474000 audit[1802]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.474000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7c1ab1e0 a2=0 a3=7ffd7c1ab1cc items=0 ppid=1668 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:58:37.478000 audit[1804]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.478000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9b98df20 a2=0 a3=7fff9b98df0c items=0 ppid=1668 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:58:37.484000 audit[1807]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:58:37.484000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc3f050830 a2=0 a3=7ffc3f05081c items=0 ppid=1668 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:58:37.492000 audit[1809]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:58:37.492000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc45f3ecc0 a2=0 a3=7ffc45f3ecac items=0 ppid=1668 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.492000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:37.493000 audit[1809]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:58:37.493000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc45f3ecc0 a2=0 a3=7ffc45f3ecac items=0 ppid=1668 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:37.493000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:37.726437 kubelet[1515]: E1213 15:58:37.726188 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:37.874111 kubelet[1515]: E1213 15:58:37.874023 1515 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hwng" podUID="ff02e76e-0863-40d1-a38d-ac080b991379" Dec 13 15:58:37.906625 kubelet[1515]: I1213 15:58:37.906544 1515 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-c65fm" podStartSLOduration=4.93223978 podStartE2EDuration="6.906337276s" podCreationTimestamp="2024-12-13 15:58:31 +0000 UTC" firstStartedPulling="2024-12-13 15:58:34.983349217 +0000 UTC m=+3.821524433" lastFinishedPulling="2024-12-13 15:58:36.95744667 +0000 UTC m=+5.795621929" observedRunningTime="2024-12-13 15:58:37.905545453 +0000 UTC m=+6.743720737" watchObservedRunningTime="2024-12-13 15:58:37.906337276 +0000 UTC m=+6.744512578" Dec 13 15:58:37.971823 kubelet[1515]: E1213 15:58:37.971766 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.971823 kubelet[1515]: W1213 15:58:37.971806 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.972210 kubelet[1515]: E1213 15:58:37.971854 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.972210 kubelet[1515]: E1213 15:58:37.972190 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.972210 kubelet[1515]: W1213 15:58:37.972202 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.972495 kubelet[1515]: E1213 15:58:37.972223 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.972495 kubelet[1515]: E1213 15:58:37.972476 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.972495 kubelet[1515]: W1213 15:58:37.972488 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.972779 kubelet[1515]: E1213 15:58:37.972536 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.972779 kubelet[1515]: E1213 15:58:37.972777 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.972946 kubelet[1515]: W1213 15:58:37.972789 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.972946 kubelet[1515]: E1213 15:58:37.972872 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.973172 kubelet[1515]: E1213 15:58:37.973133 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.973172 kubelet[1515]: W1213 15:58:37.973156 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.973365 kubelet[1515]: E1213 15:58:37.973178 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.973468 kubelet[1515]: E1213 15:58:37.973407 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.973468 kubelet[1515]: W1213 15:58:37.973419 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.973468 kubelet[1515]: E1213 15:58:37.973436 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.973766 kubelet[1515]: E1213 15:58:37.973690 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.973766 kubelet[1515]: W1213 15:58:37.973701 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.973766 kubelet[1515]: E1213 15:58:37.973718 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.974025 kubelet[1515]: E1213 15:58:37.973941 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.974025 kubelet[1515]: W1213 15:58:37.973952 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.974025 kubelet[1515]: E1213 15:58:37.973969 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.974273 kubelet[1515]: E1213 15:58:37.974194 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.974273 kubelet[1515]: W1213 15:58:37.974205 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.974273 kubelet[1515]: E1213 15:58:37.974222 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.974568 kubelet[1515]: E1213 15:58:37.974433 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.974568 kubelet[1515]: W1213 15:58:37.974444 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.974568 kubelet[1515]: E1213 15:58:37.974476 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.974821 kubelet[1515]: E1213 15:58:37.974720 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.974821 kubelet[1515]: W1213 15:58:37.974731 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.974821 kubelet[1515]: E1213 15:58:37.974749 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.975105 kubelet[1515]: E1213 15:58:37.974984 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.975105 kubelet[1515]: W1213 15:58:37.974995 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.975105 kubelet[1515]: E1213 15:58:37.975012 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.975344 kubelet[1515]: E1213 15:58:37.975245 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.975344 kubelet[1515]: W1213 15:58:37.975255 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.975344 kubelet[1515]: E1213 15:58:37.975272 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.975622 kubelet[1515]: E1213 15:58:37.975543 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.975622 kubelet[1515]: W1213 15:58:37.975556 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.975622 kubelet[1515]: E1213 15:58:37.975575 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.975860 kubelet[1515]: E1213 15:58:37.975791 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.975860 kubelet[1515]: W1213 15:58:37.975802 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.975860 kubelet[1515]: E1213 15:58:37.975819 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.976084 kubelet[1515]: E1213 15:58:37.976029 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.976084 kubelet[1515]: W1213 15:58:37.976040 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.976084 kubelet[1515]: E1213 15:58:37.976057 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.976337 kubelet[1515]: E1213 15:58:37.976273 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.976337 kubelet[1515]: W1213 15:58:37.976284 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.976337 kubelet[1515]: E1213 15:58:37.976300 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.976653 kubelet[1515]: E1213 15:58:37.976545 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.976653 kubelet[1515]: W1213 15:58:37.976597 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.976653 kubelet[1515]: E1213 15:58:37.976626 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.976897 kubelet[1515]: E1213 15:58:37.976864 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.976897 kubelet[1515]: W1213 15:58:37.976875 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.976897 kubelet[1515]: E1213 15:58:37.976891 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.977135 kubelet[1515]: E1213 15:58:37.977110 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.977135 kubelet[1515]: W1213 15:58:37.977123 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.977300 kubelet[1515]: E1213 15:58:37.977140 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.982165 kubelet[1515]: E1213 15:58:37.982117 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.982165 kubelet[1515]: W1213 15:58:37.982158 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.982524 kubelet[1515]: E1213 15:58:37.982207 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.982916 kubelet[1515]: E1213 15:58:37.982887 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.982916 kubelet[1515]: W1213 15:58:37.982914 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.983145 kubelet[1515]: E1213 15:58:37.982959 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.983415 kubelet[1515]: E1213 15:58:37.983388 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.983415 kubelet[1515]: W1213 15:58:37.983413 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.983657 kubelet[1515]: E1213 15:58:37.983467 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.983906 kubelet[1515]: E1213 15:58:37.983881 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.983906 kubelet[1515]: W1213 15:58:37.983904 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.984267 kubelet[1515]: E1213 15:58:37.984203 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.984267 kubelet[1515]: E1213 15:58:37.984237 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.984267 kubelet[1515]: W1213 15:58:37.984253 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.984653 kubelet[1515]: E1213 15:58:37.984291 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.984755 kubelet[1515]: E1213 15:58:37.984670 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.984755 kubelet[1515]: W1213 15:58:37.984686 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.984755 kubelet[1515]: E1213 15:58:37.984711 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.985046 kubelet[1515]: E1213 15:58:37.985010 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.985046 kubelet[1515]: W1213 15:58:37.985034 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.985246 kubelet[1515]: E1213 15:58:37.985068 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.985533 kubelet[1515]: E1213 15:58:37.985449 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.985674 kubelet[1515]: W1213 15:58:37.985502 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.986287 kubelet[1515]: E1213 15:58:37.985803 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.986287 kubelet[1515]: E1213 15:58:37.985867 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.986287 kubelet[1515]: W1213 15:58:37.985883 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.986287 kubelet[1515]: E1213 15:58:37.985908 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.986287 kubelet[1515]: E1213 15:58:37.986280 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.986905 kubelet[1515]: W1213 15:58:37.986298 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.986905 kubelet[1515]: E1213 15:58:37.986338 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.987124 kubelet[1515]: E1213 15:58:37.987091 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.987124 kubelet[1515]: W1213 15:58:37.987119 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.987325 kubelet[1515]: E1213 15:58:37.987158 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:37.987625 kubelet[1515]: E1213 15:58:37.987599 1515 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:58:37.987625 kubelet[1515]: W1213 15:58:37.987622 1515 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:58:37.987820 kubelet[1515]: E1213 15:58:37.987649 1515 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:58:38.133312 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2526267778.mount: Deactivated successfully. Dec 13 15:58:38.290696 env[1199]: time="2024-12-13T15:58:38.290595974Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:38.293155 env[1199]: time="2024-12-13T15:58:38.293093299Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:38.295976 env[1199]: time="2024-12-13T15:58:38.295906030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:38.297178 env[1199]: time="2024-12-13T15:58:38.297132936Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 15:58:38.299361 env[1199]: time="2024-12-13T15:58:38.299323306Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:38.301557 env[1199]: time="2024-12-13T15:58:38.301474209Z" level=info msg="CreateContainer within sandbox \"099ba875d7588ad044c3535a4e391e07dbc690e51c9c1587c54241209eca5328\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 15:58:38.313159 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1331471904.mount: Deactivated successfully. Dec 13 15:58:38.317341 env[1199]: time="2024-12-13T15:58:38.317264938Z" level=info msg="CreateContainer within sandbox \"099ba875d7588ad044c3535a4e391e07dbc690e51c9c1587c54241209eca5328\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8a9bf89a47f29a0e78f8f3e90b4cf71a489bc63aa616674d0d8b3bc320aaf235\"" Dec 13 15:58:38.318262 env[1199]: time="2024-12-13T15:58:38.318213531Z" level=info msg="StartContainer for \"8a9bf89a47f29a0e78f8f3e90b4cf71a489bc63aa616674d0d8b3bc320aaf235\"" Dec 13 15:58:38.345743 systemd[1]: Started cri-containerd-8a9bf89a47f29a0e78f8f3e90b4cf71a489bc63aa616674d0d8b3bc320aaf235.scope. Dec 13 15:58:38.371000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.371000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe348ed74e8 items=0 ppid=1582 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:38.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861396266383961343766323961306537386638663365393062346366 Dec 13 15:58:38.371000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.371000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.371000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.371000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.371000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.371000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.371000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.371000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.371000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.371000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.371000 audit: BPF prog-id=72 op=LOAD Dec 13 15:58:38.371000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003a3408 items=0 ppid=1582 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:38.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861396266383961343766323961306537386638663365393062346366 Dec 13 15:58:38.372000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.372000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.372000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.372000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.372000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.372000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.372000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.372000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.372000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.372000 audit: BPF prog-id=73 op=LOAD Dec 13 15:58:38.372000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003a3458 items=0 ppid=1582 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:38.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861396266383961343766323961306537386638663365393062346366 Dec 13 15:58:38.373000 audit: BPF prog-id=73 op=UNLOAD Dec 13 15:58:38.373000 audit: BPF prog-id=72 op=UNLOAD Dec 13 15:58:38.373000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.373000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.373000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.373000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.373000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.373000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.373000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.373000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.373000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.373000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:38.373000 audit: BPF prog-id=74 op=LOAD Dec 13 15:58:38.373000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003a34e8 items=0 ppid=1582 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:38.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861396266383961343766323961306537386638663365393062346366 Dec 13 15:58:38.392599 env[1199]: time="2024-12-13T15:58:38.390906421Z" level=info msg="StartContainer for \"8a9bf89a47f29a0e78f8f3e90b4cf71a489bc63aa616674d0d8b3bc320aaf235\" returns successfully" Dec 13 15:58:38.404166 systemd[1]: cri-containerd-8a9bf89a47f29a0e78f8f3e90b4cf71a489bc63aa616674d0d8b3bc320aaf235.scope: Deactivated successfully. Dec 13 15:58:38.406000 audit: BPF prog-id=74 op=UNLOAD Dec 13 15:58:38.425117 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8a9bf89a47f29a0e78f8f3e90b4cf71a489bc63aa616674d0d8b3bc320aaf235-rootfs.mount: Deactivated successfully. Dec 13 15:58:38.488210 env[1199]: time="2024-12-13T15:58:38.488142247Z" level=info msg="shim disconnected" id=8a9bf89a47f29a0e78f8f3e90b4cf71a489bc63aa616674d0d8b3bc320aaf235 Dec 13 15:58:38.488622 env[1199]: time="2024-12-13T15:58:38.488594739Z" level=warning msg="cleaning up after shim disconnected" id=8a9bf89a47f29a0e78f8f3e90b4cf71a489bc63aa616674d0d8b3bc320aaf235 namespace=k8s.io Dec 13 15:58:38.488761 env[1199]: time="2024-12-13T15:58:38.488742967Z" level=info msg="cleaning up dead shim" Dec 13 15:58:38.499916 env[1199]: time="2024-12-13T15:58:38.499882021Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:58:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1887 runtime=io.containerd.runc.v2\n" Dec 13 15:58:38.727329 kubelet[1515]: E1213 15:58:38.727140 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:38.898353 env[1199]: time="2024-12-13T15:58:38.898278657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 15:58:39.729157 kubelet[1515]: E1213 15:58:39.729086 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:39.874417 kubelet[1515]: E1213 15:58:39.873809 1515 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hwng" podUID="ff02e76e-0863-40d1-a38d-ac080b991379" Dec 13 15:58:40.730062 kubelet[1515]: E1213 15:58:40.730001 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:41.731323 kubelet[1515]: E1213 15:58:41.731210 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:41.769661 update_engine[1190]: I1213 15:58:41.768270 1190 update_attempter.cc:509] Updating boot flags... Dec 13 15:58:41.875554 kubelet[1515]: E1213 15:58:41.875230 1515 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hwng" podUID="ff02e76e-0863-40d1-a38d-ac080b991379" Dec 13 15:58:42.732236 kubelet[1515]: E1213 15:58:42.732171 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:43.610954 env[1199]: time="2024-12-13T15:58:43.610871499Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:43.616085 env[1199]: time="2024-12-13T15:58:43.616050996Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:43.617963 env[1199]: time="2024-12-13T15:58:43.617936833Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:43.619709 env[1199]: time="2024-12-13T15:58:43.619683900Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:43.620415 env[1199]: time="2024-12-13T15:58:43.620388959Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 15:58:43.622839 env[1199]: time="2024-12-13T15:58:43.622810942Z" level=info msg="CreateContainer within sandbox \"099ba875d7588ad044c3535a4e391e07dbc690e51c9c1587c54241209eca5328\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 15:58:43.632477 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3463616683.mount: Deactivated successfully. Dec 13 15:58:43.646019 env[1199]: time="2024-12-13T15:58:43.645956977Z" level=info msg="CreateContainer within sandbox \"099ba875d7588ad044c3535a4e391e07dbc690e51c9c1587c54241209eca5328\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8c5440029e7d0f31a0c0996aa8fdda1c4bcec7edc51fbb109943b419d86d40c6\"" Dec 13 15:58:43.646600 env[1199]: time="2024-12-13T15:58:43.646525207Z" level=info msg="StartContainer for \"8c5440029e7d0f31a0c0996aa8fdda1c4bcec7edc51fbb109943b419d86d40c6\"" Dec 13 15:58:43.670430 systemd[1]: Started cri-containerd-8c5440029e7d0f31a0c0996aa8fdda1c4bcec7edc51fbb109943b419d86d40c6.scope. Dec 13 15:58:43.700352 kernel: kauditd_printk_skb: 348 callbacks suppressed Dec 13 15:58:43.700557 kernel: audit: type=1400 audit(1734105523.693:536): avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.693000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.693000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f2cc4c13a98 items=0 ppid=1582 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:43.705536 kernel: audit: type=1300 audit(1734105523.693:536): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f2cc4c13a98 items=0 ppid=1582 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:43.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863353434303032396537643066333161306330393936616138666464 Dec 13 15:58:43.713153 kernel: audit: type=1327 audit(1734105523.693:536): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863353434303032396537643066333161306330393936616138666464 Dec 13 15:58:43.713308 kernel: audit: type=1400 audit(1734105523.696:537): avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.713380 kernel: audit: type=1400 audit(1734105523.696:537): avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.718408 kernel: audit: type=1400 audit(1734105523.696:537): avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.722599 kernel: audit: type=1400 audit(1734105523.696:537): avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.731345 kernel: audit: type=1400 audit(1734105523.696:537): avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.731423 kernel: audit: type=1400 audit(1734105523.696:537): avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.731457 kernel: audit: type=1400 audit(1734105523.696:537): avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.734257 kubelet[1515]: E1213 15:58:43.734212 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit: BPF prog-id=75 op=LOAD Dec 13 15:58:43.696000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003901c8 items=0 ppid=1582 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:43.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863353434303032396537643066333161306330393936616138666464 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.696000 audit: BPF prog-id=76 op=LOAD Dec 13 15:58:43.696000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000390218 items=0 ppid=1582 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:43.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863353434303032396537643066333161306330393936616138666464 Dec 13 15:58:43.699000 audit: BPF prog-id=76 op=UNLOAD Dec 13 15:58:43.699000 audit: BPF prog-id=75 op=UNLOAD Dec 13 15:58:43.699000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.699000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.699000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.699000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.699000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.699000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.699000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.699000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.699000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.699000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:43.699000 audit: BPF prog-id=77 op=LOAD Dec 13 15:58:43.699000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003902a8 items=0 ppid=1582 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:43.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863353434303032396537643066333161306330393936616138666464 Dec 13 15:58:43.741601 env[1199]: time="2024-12-13T15:58:43.741557918Z" level=info msg="StartContainer for \"8c5440029e7d0f31a0c0996aa8fdda1c4bcec7edc51fbb109943b419d86d40c6\" returns successfully" Dec 13 15:58:43.874497 kubelet[1515]: E1213 15:58:43.874383 1515 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hwng" podUID="ff02e76e-0863-40d1-a38d-ac080b991379" Dec 13 15:58:44.270947 env[1199]: time="2024-12-13T15:58:44.270824397Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:58:44.275129 systemd[1]: cri-containerd-8c5440029e7d0f31a0c0996aa8fdda1c4bcec7edc51fbb109943b419d86d40c6.scope: Deactivated successfully. Dec 13 15:58:44.277000 audit: BPF prog-id=77 op=UNLOAD Dec 13 15:58:44.298790 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8c5440029e7d0f31a0c0996aa8fdda1c4bcec7edc51fbb109943b419d86d40c6-rootfs.mount: Deactivated successfully. Dec 13 15:58:44.335246 env[1199]: time="2024-12-13T15:58:44.335151488Z" level=info msg="shim disconnected" id=8c5440029e7d0f31a0c0996aa8fdda1c4bcec7edc51fbb109943b419d86d40c6 Dec 13 15:58:44.335476 env[1199]: time="2024-12-13T15:58:44.335250688Z" level=warning msg="cleaning up after shim disconnected" id=8c5440029e7d0f31a0c0996aa8fdda1c4bcec7edc51fbb109943b419d86d40c6 namespace=k8s.io Dec 13 15:58:44.335476 env[1199]: time="2024-12-13T15:58:44.335281463Z" level=info msg="cleaning up dead shim" Dec 13 15:58:44.348363 env[1199]: time="2024-12-13T15:58:44.348285426Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:58:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1965 runtime=io.containerd.runc.v2\n" Dec 13 15:58:44.358873 kubelet[1515]: I1213 15:58:44.358141 1515 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 15:58:44.735781 kubelet[1515]: E1213 15:58:44.734836 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:44.915093 env[1199]: time="2024-12-13T15:58:44.914973284Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 15:58:45.735884 kubelet[1515]: E1213 15:58:45.735746 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:45.880654 systemd[1]: Created slice kubepods-besteffort-podff02e76e_0863_40d1_a38d_ac080b991379.slice. Dec 13 15:58:45.883461 env[1199]: time="2024-12-13T15:58:45.883392457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2hwng,Uid:ff02e76e-0863-40d1-a38d-ac080b991379,Namespace:calico-system,Attempt:0,}" Dec 13 15:58:45.953270 env[1199]: time="2024-12-13T15:58:45.953177606Z" level=error msg="Failed to destroy network for sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:58:45.954270 env[1199]: time="2024-12-13T15:58:45.954218999Z" level=error msg="encountered an error cleaning up failed sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:58:45.954491 env[1199]: time="2024-12-13T15:58:45.954439399Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2hwng,Uid:ff02e76e-0863-40d1-a38d-ac080b991379,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:58:45.955429 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d-shm.mount: Deactivated successfully. Dec 13 15:58:45.957715 kubelet[1515]: E1213 15:58:45.957689 1515 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:58:45.957851 kubelet[1515]: E1213 15:58:45.957752 1515 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2hwng" Dec 13 15:58:45.957851 kubelet[1515]: E1213 15:58:45.957774 1515 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2hwng" Dec 13 15:58:45.957851 kubelet[1515]: E1213 15:58:45.957824 1515 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2hwng_calico-system(ff02e76e-0863-40d1-a38d-ac080b991379)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2hwng_calico-system(ff02e76e-0863-40d1-a38d-ac080b991379)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2hwng" podUID="ff02e76e-0863-40d1-a38d-ac080b991379" Dec 13 15:58:46.737038 kubelet[1515]: E1213 15:58:46.736928 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:46.926428 kubelet[1515]: I1213 15:58:46.926351 1515 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:58:46.927967 env[1199]: time="2024-12-13T15:58:46.927875996Z" level=info msg="StopPodSandbox for \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\"" Dec 13 15:58:46.975952 env[1199]: time="2024-12-13T15:58:46.975882705Z" level=error msg="StopPodSandbox for \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\" failed" error="failed to destroy network for sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:58:46.976396 kubelet[1515]: E1213 15:58:46.976222 1515 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:58:46.976396 kubelet[1515]: E1213 15:58:46.976325 1515 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d"} Dec 13 15:58:46.976396 kubelet[1515]: E1213 15:58:46.976364 1515 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ff02e76e-0863-40d1-a38d-ac080b991379\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:58:46.976592 kubelet[1515]: E1213 15:58:46.976403 1515 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ff02e76e-0863-40d1-a38d-ac080b991379\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2hwng" podUID="ff02e76e-0863-40d1-a38d-ac080b991379" Dec 13 15:58:47.737234 kubelet[1515]: E1213 15:58:47.737134 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:48.738454 kubelet[1515]: E1213 15:58:48.738360 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:49.739855 kubelet[1515]: E1213 15:58:49.739801 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:50.740943 kubelet[1515]: E1213 15:58:50.740889 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:51.037892 kubelet[1515]: I1213 15:58:51.036748 1515 topology_manager.go:215] "Topology Admit Handler" podUID="202673e9-9494-453d-93e2-2e4a6e052528" podNamespace="default" podName="nginx-deployment-6d5f899847-rshns" Dec 13 15:58:51.046714 systemd[1]: Created slice kubepods-besteffort-pod202673e9_9494_453d_93e2_2e4a6e052528.slice. Dec 13 15:58:51.078728 kubelet[1515]: I1213 15:58:51.078621 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gcqf2\" (UniqueName: \"kubernetes.io/projected/202673e9-9494-453d-93e2-2e4a6e052528-kube-api-access-gcqf2\") pod \"nginx-deployment-6d5f899847-rshns\" (UID: \"202673e9-9494-453d-93e2-2e4a6e052528\") " pod="default/nginx-deployment-6d5f899847-rshns" Dec 13 15:58:51.353015 env[1199]: time="2024-12-13T15:58:51.352481621Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-rshns,Uid:202673e9-9494-453d-93e2-2e4a6e052528,Namespace:default,Attempt:0,}" Dec 13 15:58:51.459275 env[1199]: time="2024-12-13T15:58:51.459217063Z" level=error msg="Failed to destroy network for sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:58:51.459778 env[1199]: time="2024-12-13T15:58:51.459743397Z" level=error msg="encountered an error cleaning up failed sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:58:51.459924 env[1199]: time="2024-12-13T15:58:51.459897589Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-rshns,Uid:202673e9-9494-453d-93e2-2e4a6e052528,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:58:51.460689 kubelet[1515]: E1213 15:58:51.460251 1515 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:58:51.460689 kubelet[1515]: E1213 15:58:51.460314 1515 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-rshns" Dec 13 15:58:51.460689 kubelet[1515]: E1213 15:58:51.460335 1515 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-rshns" Dec 13 15:58:51.460916 kubelet[1515]: E1213 15:58:51.460398 1515 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-rshns_default(202673e9-9494-453d-93e2-2e4a6e052528)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-rshns_default(202673e9-9494-453d-93e2-2e4a6e052528)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-rshns" podUID="202673e9-9494-453d-93e2-2e4a6e052528" Dec 13 15:58:51.461245 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207-shm.mount: Deactivated successfully. Dec 13 15:58:51.720839 kubelet[1515]: E1213 15:58:51.720379 1515 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:51.741673 kubelet[1515]: E1213 15:58:51.741628 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:51.938795 kubelet[1515]: I1213 15:58:51.938743 1515 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:58:51.939389 env[1199]: time="2024-12-13T15:58:51.939344361Z" level=info msg="StopPodSandbox for \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\"" Dec 13 15:58:52.000421 env[1199]: time="2024-12-13T15:58:52.000363499Z" level=error msg="StopPodSandbox for \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\" failed" error="failed to destroy network for sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:58:52.000841 kubelet[1515]: E1213 15:58:52.000820 1515 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:58:52.000936 kubelet[1515]: E1213 15:58:52.000869 1515 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207"} Dec 13 15:58:52.000936 kubelet[1515]: E1213 15:58:52.000907 1515 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"202673e9-9494-453d-93e2-2e4a6e052528\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:58:52.000936 kubelet[1515]: E1213 15:58:52.000937 1515 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"202673e9-9494-453d-93e2-2e4a6e052528\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-rshns" podUID="202673e9-9494-453d-93e2-2e4a6e052528" Dec 13 15:58:52.633401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3694923004.mount: Deactivated successfully. Dec 13 15:58:52.673532 env[1199]: time="2024-12-13T15:58:52.673425783Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:52.675067 env[1199]: time="2024-12-13T15:58:52.675018264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:52.676669 env[1199]: time="2024-12-13T15:58:52.676639410Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:52.678703 env[1199]: time="2024-12-13T15:58:52.678664430Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:52.679885 env[1199]: time="2024-12-13T15:58:52.679832223Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 15:58:52.701335 env[1199]: time="2024-12-13T15:58:52.701286779Z" level=info msg="CreateContainer within sandbox \"099ba875d7588ad044c3535a4e391e07dbc690e51c9c1587c54241209eca5328\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 15:58:52.722769 env[1199]: time="2024-12-13T15:58:52.722706534Z" level=info msg="CreateContainer within sandbox \"099ba875d7588ad044c3535a4e391e07dbc690e51c9c1587c54241209eca5328\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2f57999e23eb6cf26873bb687114d4c307781383015b044207a8834a482dff77\"" Dec 13 15:58:52.723572 env[1199]: time="2024-12-13T15:58:52.723533364Z" level=info msg="StartContainer for \"2f57999e23eb6cf26873bb687114d4c307781383015b044207a8834a482dff77\"" Dec 13 15:58:52.743326 systemd[1]: Started cri-containerd-2f57999e23eb6cf26873bb687114d4c307781383015b044207a8834a482dff77.scope. Dec 13 15:58:52.748725 kubelet[1515]: E1213 15:58:52.743603 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:52.776138 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 15:58:52.777912 kernel: audit: type=1400 audit(1734105532.768:543): avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f65d8bfb718 items=0 ppid=1582 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:52.783675 kernel: audit: type=1300 audit(1734105532.768:543): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f65d8bfb718 items=0 ppid=1582 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:52.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353739393965323365623663663236383733626236383731313464 Dec 13 15:58:52.792340 kernel: audit: type=1327 audit(1734105532.768:543): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353739393965323365623663663236383733626236383731313464 Dec 13 15:58:52.792427 kernel: audit: type=1400 audit(1734105532.768:544): avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.795573 kernel: audit: type=1400 audit(1734105532.768:544): avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.801201 kernel: audit: type=1400 audit(1734105532.768:544): avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.801262 kernel: audit: type=1400 audit(1734105532.768:544): avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.803923 kernel: audit: type=1400 audit(1734105532.768:544): avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.807566 kernel: audit: type=1400 audit(1734105532.768:544): avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.810561 kernel: audit: type=1400 audit(1734105532.768:544): avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit: BPF prog-id=78 op=LOAD Dec 13 15:58:52.768000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00028a208 items=0 ppid=1582 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:52.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353739393965323365623663663236383733626236383731313464 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit: BPF prog-id=79 op=LOAD Dec 13 15:58:52.768000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00028a258 items=0 ppid=1582 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:52.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353739393965323365623663663236383733626236383731313464 Dec 13 15:58:52.768000 audit: BPF prog-id=79 op=UNLOAD Dec 13 15:58:52.768000 audit: BPF prog-id=78 op=UNLOAD Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:52.768000 audit: BPF prog-id=80 op=LOAD Dec 13 15:58:52.768000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00028a2e8 items=0 ppid=1582 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:52.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353739393965323365623663663236383733626236383731313464 Dec 13 15:58:52.812727 env[1199]: time="2024-12-13T15:58:52.812683450Z" level=info msg="StartContainer for \"2f57999e23eb6cf26873bb687114d4c307781383015b044207a8834a482dff77\" returns successfully" Dec 13 15:58:52.919604 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 15:58:52.919937 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 15:58:53.011682 kubelet[1515]: I1213 15:58:53.011604 1515 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-6xvqf" podStartSLOduration=4.316535718 podStartE2EDuration="22.011442231s" podCreationTimestamp="2024-12-13 15:58:31 +0000 UTC" firstStartedPulling="2024-12-13 15:58:34.985439783 +0000 UTC m=+3.823614998" lastFinishedPulling="2024-12-13 15:58:52.680346283 +0000 UTC m=+21.518521511" observedRunningTime="2024-12-13 15:58:53.008797139 +0000 UTC m=+21.846972413" watchObservedRunningTime="2024-12-13 15:58:53.011442231 +0000 UTC m=+21.849617551" Dec 13 15:58:53.744563 kubelet[1515]: E1213 15:58:53.744405 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:53.984942 systemd[1]: run-containerd-runc-k8s.io-2f57999e23eb6cf26873bb687114d4c307781383015b044207a8834a482dff77-runc.73s4fY.mount: Deactivated successfully. Dec 13 15:58:54.445000 audit[2238]: AVC avc: denied { write } for pid=2238 comm="tee" name="fd" dev="proc" ino=21652 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:58:54.445000 audit[2238]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe57afaa10 a2=241 a3=1b6 items=1 ppid=2200 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.445000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 15:58:54.445000 audit: PATH item=0 name="/dev/fd/63" inode=21645 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:58:54.445000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:58:54.453000 audit[2240]: AVC avc: denied { write } for pid=2240 comm="tee" name="fd" dev="proc" ino=22592 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:58:54.453000 audit[2240]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd06d04a10 a2=241 a3=1b6 items=1 ppid=2197 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.453000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 15:58:54.453000 audit: PATH item=0 name="/dev/fd/63" inode=22584 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:58:54.453000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:58:54.453000 audit[2236]: AVC avc: denied { write } for pid=2236 comm="tee" name="fd" dev="proc" ino=22596 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:58:54.453000 audit[2236]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc41e1da11 a2=241 a3=1b6 items=1 ppid=2202 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.453000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 15:58:54.453000 audit: PATH item=0 name="/dev/fd/63" inode=22577 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:58:54.453000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:58:54.459000 audit[2249]: AVC avc: denied { write } for pid=2249 comm="tee" name="fd" dev="proc" ino=22603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:58:54.459000 audit[2249]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9557ba00 a2=241 a3=1b6 items=1 ppid=2199 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.459000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 15:58:54.459000 audit: PATH item=0 name="/dev/fd/63" inode=22587 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:58:54.459000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:58:54.461000 audit[2254]: AVC avc: denied { write } for pid=2254 comm="tee" name="fd" dev="proc" ino=21662 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:58:54.463000 audit[2264]: AVC avc: denied { write } for pid=2264 comm="tee" name="fd" dev="proc" ino=21665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:58:54.461000 audit[2254]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffdd441a01 a2=241 a3=1b6 items=1 ppid=2205 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.461000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 15:58:54.461000 audit: PATH item=0 name="/dev/fd/63" inode=21655 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:58:54.461000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:58:54.463000 audit[2264]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4f342a12 a2=241 a3=1b6 items=1 ppid=2211 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.463000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 15:58:54.463000 audit: PATH item=0 name="/dev/fd/63" inode=21659 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:58:54.463000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:58:54.470000 audit[2258]: AVC avc: denied { write } for pid=2258 comm="tee" name="fd" dev="proc" ino=22610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:58:54.470000 audit[2258]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9c107a10 a2=241 a3=1b6 items=1 ppid=2207 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.470000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 15:58:54.470000 audit: PATH item=0 name="/dev/fd/63" inode=21658 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:58:54.470000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:58:54.612000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.612000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.612000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.612000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.612000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.612000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.612000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.612000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.612000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.612000 audit: BPF prog-id=81 op=LOAD Dec 13 15:58:54.612000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe08190910 a2=98 a3=3 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.612000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.613000 audit: BPF prog-id=81 op=UNLOAD Dec 13 15:58:54.617000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.617000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.617000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.617000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.617000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.617000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.617000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.617000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.617000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.617000 audit: BPF prog-id=82 op=LOAD Dec 13 15:58:54.617000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe081906f0 a2=74 a3=540051 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.617000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.618000 audit: BPF prog-id=82 op=UNLOAD Dec 13 15:58:54.618000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.618000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.618000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.618000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.618000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.618000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.618000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.618000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.618000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.618000 audit: BPF prog-id=83 op=LOAD Dec 13 15:58:54.618000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe08190720 a2=94 a3=2 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.618000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.619000 audit: BPF prog-id=83 op=UNLOAD Dec 13 15:58:54.745549 kubelet[1515]: E1213 15:58:54.745490 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:54.771000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.771000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.771000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.771000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.771000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.771000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.771000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.771000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.771000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.771000 audit: BPF prog-id=84 op=LOAD Dec 13 15:58:54.771000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe081905e0 a2=40 a3=1 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.771000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.772000 audit: BPF prog-id=84 op=UNLOAD Dec 13 15:58:54.772000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.772000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe081906b0 a2=50 a3=7ffe08190790 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.772000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.783000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.783000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe081905f0 a2=28 a3=0 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.783000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.783000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.783000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe08190620 a2=28 a3=0 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.783000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.784000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.784000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe08190530 a2=28 a3=0 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.784000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.784000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.784000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe08190640 a2=28 a3=0 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.784000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.784000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.784000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe08190620 a2=28 a3=0 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.784000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.784000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.784000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe08190610 a2=28 a3=0 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.784000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.784000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.784000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe08190640 a2=28 a3=0 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.784000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.784000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.784000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe08190620 a2=28 a3=0 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.784000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.784000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.784000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe08190640 a2=28 a3=0 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.784000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe08190610 a2=28 a3=0 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe08190680 a2=28 a3=0 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe08190430 a2=50 a3=1 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.785000 audit: BPF prog-id=85 op=LOAD Dec 13 15:58:54.785000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe08190430 a2=94 a3=5 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.786000 audit: BPF prog-id=85 op=UNLOAD Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe081904e0 a2=50 a3=1 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe08190600 a2=4 a3=38 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.786000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:58:54.786000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe08190650 a2=94 a3=6 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:58:54.787000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe0818fe00 a2=94 a3=83 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.787000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:58:54.787000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe0818fe00 a2=94 a3=83 items=0 ppid=2198 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit: BPF prog-id=86 op=LOAD Dec 13 15:58:54.798000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef0be2e40 a2=98 a3=1999999999999999 items=0 ppid=2198 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.798000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:58:54.798000 audit: BPF prog-id=86 op=UNLOAD Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.798000 audit: BPF prog-id=87 op=LOAD Dec 13 15:58:54.798000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef0be2d20 a2=74 a3=ffff items=0 ppid=2198 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.798000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:58:54.799000 audit: BPF prog-id=87 op=UNLOAD Dec 13 15:58:54.799000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.799000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.799000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.799000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.799000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.799000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.799000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.799000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.799000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.799000 audit: BPF prog-id=88 op=LOAD Dec 13 15:58:54.799000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef0be2d60 a2=40 a3=7ffef0be2f40 items=0 ppid=2198 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.799000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:58:54.800000 audit: BPF prog-id=88 op=UNLOAD Dec 13 15:58:54.886708 systemd-networkd[1019]: vxlan.calico: Link UP Dec 13 15:58:54.886728 systemd-networkd[1019]: vxlan.calico: Gained carrier Dec 13 15:58:54.953000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.953000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.953000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.953000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.953000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.953000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.953000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.953000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.953000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.953000 audit: BPF prog-id=89 op=LOAD Dec 13 15:58:54.953000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6a779b60 a2=98 a3=ffffffff items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.953000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.956000 audit: BPF prog-id=89 op=UNLOAD Dec 13 15:58:54.956000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.956000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.956000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.956000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.956000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.956000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.956000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.956000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.956000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.956000 audit: BPF prog-id=90 op=LOAD Dec 13 15:58:54.956000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6a779970 a2=74 a3=540051 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.956000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.957000 audit: BPF prog-id=90 op=UNLOAD Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit: BPF prog-id=91 op=LOAD Dec 13 15:58:54.957000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6a7799a0 a2=94 a3=2 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.957000 audit: BPF prog-id=91 op=UNLOAD Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6a779870 a2=28 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6a7798a0 a2=28 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6a7797b0 a2=28 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6a7798c0 a2=28 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6a7798a0 a2=28 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.957000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.957000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6a779890 a2=28 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6a7798c0 a2=28 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6a7798a0 a2=28 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6a7798c0 a2=28 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6a779890 a2=28 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6a779900 a2=28 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.958000 audit: BPF prog-id=92 op=LOAD Dec 13 15:58:54.958000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe6a779770 a2=40 a3=0 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.958000 audit: BPF prog-id=92 op=UNLOAD Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe6a779760 a2=50 a3=2800 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.961000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe6a779760 a2=50 a3=2800 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.961000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit: BPF prog-id=93 op=LOAD Dec 13 15:58:54.961000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe6a778f80 a2=94 a3=2 items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.961000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.961000 audit: BPF prog-id=93 op=UNLOAD Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.961000 audit: BPF prog-id=94 op=LOAD Dec 13 15:58:54.961000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe6a779080 a2=94 a3=2d items=0 ppid=2198 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.961000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit: BPF prog-id=95 op=LOAD Dec 13 15:58:54.967000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffdbb54f00 a2=98 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:54.967000 audit: BPF prog-id=95 op=UNLOAD Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit: BPF prog-id=96 op=LOAD Dec 13 15:58:54.967000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffdbb54ce0 a2=74 a3=540051 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:54.967000 audit: BPF prog-id=96 op=UNLOAD Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:54.967000 audit: BPF prog-id=97 op=LOAD Dec 13 15:58:54.967000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffdbb54d10 a2=94 a3=2 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:54.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:54.967000 audit: BPF prog-id=97 op=UNLOAD Dec 13 15:58:54.996359 systemd[1]: run-containerd-runc-k8s.io-2f57999e23eb6cf26873bb687114d4c307781383015b044207a8834a482dff77-runc.osy6Gt.mount: Deactivated successfully. Dec 13 15:58:55.168000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.168000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.168000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.168000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.168000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.168000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.168000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.168000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.168000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.168000 audit: BPF prog-id=98 op=LOAD Dec 13 15:58:55.168000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffdbb54bd0 a2=40 a3=1 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.168000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.169000 audit: BPF prog-id=98 op=UNLOAD Dec 13 15:58:55.169000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.169000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffdbb54ca0 a2=50 a3=7fffdbb54d80 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.169000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdbb54be0 a2=28 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdbb54c10 a2=28 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdbb54b20 a2=28 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdbb54c30 a2=28 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdbb54c10 a2=28 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdbb54c00 a2=28 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdbb54c30 a2=28 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdbb54c10 a2=28 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdbb54c30 a2=28 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdbb54c00 a2=28 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdbb54c70 a2=28 a3=0 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffdbb54a20 a2=50 a3=1 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.180000 audit: BPF prog-id=99 op=LOAD Dec 13 15:58:55.180000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffdbb54a20 a2=94 a3=5 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.181000 audit: BPF prog-id=99 op=UNLOAD Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffdbb54ad0 a2=50 a3=1 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffdbb54bf0 a2=4 a3=38 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { confidentiality } for pid=2340 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:58:55.181000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffdbb54c40 a2=94 a3=6 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { confidentiality } for pid=2340 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:58:55.181000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffdbb543f0 a2=94 a3=83 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { confidentiality } for pid=2340 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:58:55.181000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffdbb543f0 a2=94 a3=83 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.181000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.181000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffdbb55e30 a2=10 a3=f1f00800 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.182000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.182000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffdbb55cd0 a2=10 a3=3 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.182000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.182000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.182000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffdbb55c70 a2=10 a3=3 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.182000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.182000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:55.182000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffdbb55c70 a2=10 a3=7 items=0 ppid=2198 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.182000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:58:55.192000 audit: BPF prog-id=94 op=UNLOAD Dec 13 15:58:55.261000 audit[2397]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:58:55.261000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcb6e4f360 a2=0 a3=7ffcb6e4f34c items=0 ppid=2198 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.261000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:58:55.278000 audit[2398]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:58:55.278000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffed2e03330 a2=0 a3=7ffed2e0331c items=0 ppid=2198 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.278000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:58:55.280000 audit[2396]: NETFILTER_CFG table=raw:67 family=2 entries=21 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:58:55.280000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe9fecf5a0 a2=0 a3=7ffe9fecf58c items=0 ppid=2198 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.280000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:58:55.284000 audit[2400]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:58:55.284000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff99ea1d80 a2=0 a3=7fff99ea1d6c items=0 ppid=2198 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:55.284000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:58:55.747129 kubelet[1515]: E1213 15:58:55.746931 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:56.476902 systemd-networkd[1019]: vxlan.calico: Gained IPv6LL Dec 13 15:58:56.748272 kubelet[1515]: E1213 15:58:56.748215 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:57.750007 kubelet[1515]: E1213 15:58:57.749962 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:57.876757 env[1199]: time="2024-12-13T15:58:57.876593507Z" level=info msg="StopPodSandbox for \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\"" Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:57.955 [INFO][2427] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:57.956 [INFO][2427] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" iface="eth0" netns="/var/run/netns/cni-6295bdc9-6b3a-1b7a-d1bb-ebd504427d10" Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:57.956 [INFO][2427] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" iface="eth0" netns="/var/run/netns/cni-6295bdc9-6b3a-1b7a-d1bb-ebd504427d10" Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:57.958 [INFO][2427] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" iface="eth0" netns="/var/run/netns/cni-6295bdc9-6b3a-1b7a-d1bb-ebd504427d10" Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:57.958 [INFO][2427] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:57.958 [INFO][2427] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:58.029 [INFO][2433] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" HandleID="k8s-pod-network.a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:58.029 [INFO][2433] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:58.029 [INFO][2433] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:58.041 [WARNING][2433] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" HandleID="k8s-pod-network.a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:58.041 [INFO][2433] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" HandleID="k8s-pod-network.a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:58.043 [INFO][2433] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:58:58.046692 env[1199]: 2024-12-13 15:58:58.045 [INFO][2427] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:58:58.049872 systemd[1]: run-netns-cni\x2d6295bdc9\x2d6b3a\x2d1b7a\x2dd1bb\x2debd504427d10.mount: Deactivated successfully. Dec 13 15:58:58.054251 env[1199]: time="2024-12-13T15:58:58.051621233Z" level=info msg="TearDown network for sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\" successfully" Dec 13 15:58:58.054251 env[1199]: time="2024-12-13T15:58:58.051655740Z" level=info msg="StopPodSandbox for \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\" returns successfully" Dec 13 15:58:58.054708 env[1199]: time="2024-12-13T15:58:58.054680650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2hwng,Uid:ff02e76e-0863-40d1-a38d-ac080b991379,Namespace:calico-system,Attempt:1,}" Dec 13 15:58:58.272400 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:58:58.272649 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali10fe7b94d16: link becomes ready Dec 13 15:58:58.269941 systemd-networkd[1019]: cali10fe7b94d16: Link UP Dec 13 15:58:58.272576 systemd-networkd[1019]: cali10fe7b94d16: Gained carrier Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.142 [INFO][2439] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.97.146-k8s-csi--node--driver--2hwng-eth0 csi-node-driver- calico-system ff02e76e-0863-40d1-a38d-ac080b991379 1190 0 2024-12-13 15:58:31 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.244.97.146 csi-node-driver-2hwng eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali10fe7b94d16 [] []}} ContainerID="0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" Namespace="calico-system" Pod="csi-node-driver-2hwng" WorkloadEndpoint="10.244.97.146-k8s-csi--node--driver--2hwng-" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.143 [INFO][2439] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" Namespace="calico-system" Pod="csi-node-driver-2hwng" WorkloadEndpoint="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.190 [INFO][2452] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" HandleID="k8s-pod-network.0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.209 [INFO][2452] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" HandleID="k8s-pod-network.0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003a0210), Attrs:map[string]string{"namespace":"calico-system", "node":"10.244.97.146", "pod":"csi-node-driver-2hwng", "timestamp":"2024-12-13 15:58:58.190921801 +0000 UTC"}, Hostname:"10.244.97.146", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.209 [INFO][2452] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.210 [INFO][2452] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.210 [INFO][2452] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.97.146' Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.212 [INFO][2452] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" host="10.244.97.146" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.227 [INFO][2452] ipam/ipam.go 372: Looking up existing affinities for host host="10.244.97.146" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.233 [INFO][2452] ipam/ipam.go 489: Trying affinity for 192.168.122.192/26 host="10.244.97.146" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.235 [INFO][2452] ipam/ipam.go 155: Attempting to load block cidr=192.168.122.192/26 host="10.244.97.146" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.238 [INFO][2452] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.122.192/26 host="10.244.97.146" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.238 [INFO][2452] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.122.192/26 handle="k8s-pod-network.0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" host="10.244.97.146" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.240 [INFO][2452] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486 Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.246 [INFO][2452] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.122.192/26 handle="k8s-pod-network.0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" host="10.244.97.146" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.258 [INFO][2452] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.122.193/26] block=192.168.122.192/26 handle="k8s-pod-network.0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" host="10.244.97.146" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.258 [INFO][2452] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.122.193/26] handle="k8s-pod-network.0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" host="10.244.97.146" Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.258 [INFO][2452] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:58:58.291009 env[1199]: 2024-12-13 15:58:58.258 [INFO][2452] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.193/26] IPv6=[] ContainerID="0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" HandleID="k8s-pod-network.0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:58:58.292233 env[1199]: 2024-12-13 15:58:58.262 [INFO][2439] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" Namespace="calico-system" Pod="csi-node-driver-2hwng" WorkloadEndpoint="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-csi--node--driver--2hwng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ff02e76e-0863-40d1-a38d-ac080b991379", ResourceVersion:"1190", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 58, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"", Pod:"csi-node-driver-2hwng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali10fe7b94d16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:58:58.292233 env[1199]: 2024-12-13 15:58:58.262 [INFO][2439] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.122.193/32] ContainerID="0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" Namespace="calico-system" Pod="csi-node-driver-2hwng" WorkloadEndpoint="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:58:58.292233 env[1199]: 2024-12-13 15:58:58.262 [INFO][2439] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali10fe7b94d16 ContainerID="0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" Namespace="calico-system" Pod="csi-node-driver-2hwng" WorkloadEndpoint="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:58:58.292233 env[1199]: 2024-12-13 15:58:58.274 [INFO][2439] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" Namespace="calico-system" Pod="csi-node-driver-2hwng" WorkloadEndpoint="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:58:58.292233 env[1199]: 2024-12-13 15:58:58.274 [INFO][2439] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" Namespace="calico-system" Pod="csi-node-driver-2hwng" WorkloadEndpoint="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-csi--node--driver--2hwng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ff02e76e-0863-40d1-a38d-ac080b991379", ResourceVersion:"1190", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 58, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486", Pod:"csi-node-driver-2hwng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali10fe7b94d16", MAC:"6a:ef:67:90:2f:e7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:58:58.292233 env[1199]: 2024-12-13 15:58:58.287 [INFO][2439] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486" Namespace="calico-system" Pod="csi-node-driver-2hwng" WorkloadEndpoint="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:58:58.310525 env[1199]: time="2024-12-13T15:58:58.310385390Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:58:58.310945 env[1199]: time="2024-12-13T15:58:58.310859293Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:58:58.311143 env[1199]: time="2024-12-13T15:58:58.311088798Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:58:58.311533 env[1199]: time="2024-12-13T15:58:58.311470549Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486 pid=2477 runtime=io.containerd.runc.v2 Dec 13 15:58:58.327175 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 15:58:58.327265 kernel: audit: type=1325 audit(1734105538.319:651): table=filter:69 family=2 entries=34 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:58:58.327309 kernel: audit: type=1300 audit(1734105538.319:651): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe6770bd20 a2=0 a3=7ffe6770bd0c items=0 ppid=2198 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:58.319000 audit[2487]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:58:58.319000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe6770bd20 a2=0 a3=7ffe6770bd0c items=0 ppid=2198 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:58.333175 kernel: audit: type=1327 audit(1734105538.319:651): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:58:58.319000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:58:58.341973 systemd[1]: Started cri-containerd-0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486.scope. Dec 13 15:58:58.369253 kernel: audit: type=1400 audit(1734105538.358:652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.369356 kernel: audit: type=1400 audit(1734105538.358:653): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.369397 kernel: audit: type=1400 audit(1734105538.358:654): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.375634 kernel: audit: type=1400 audit(1734105538.358:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.375695 kernel: audit: type=1400 audit(1734105538.358:656): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.382721 kernel: audit: type=1400 audit(1734105538.358:657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.382794 kernel: audit: type=1400 audit(1734105538.358:658): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.358000 audit: BPF prog-id=100 op=LOAD Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2477 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:58.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396238343136636136323563353161366161643235313037366430 Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2477 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:58.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396238343136636136323563353161366161643235313037366430 Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.360000 audit: BPF prog-id=101 op=LOAD Dec 13 15:58:58.360000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024380 items=0 ppid=2477 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:58.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396238343136636136323563353161366161643235313037366430 Dec 13 15:58:58.361000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.361000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.361000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.361000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.361000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.361000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.361000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.361000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.361000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.361000 audit: BPF prog-id=102 op=LOAD Dec 13 15:58:58.361000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000243c8 items=0 ppid=2477 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:58.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396238343136636136323563353161366161643235313037366430 Dec 13 15:58:58.364000 audit: BPF prog-id=102 op=UNLOAD Dec 13 15:58:58.364000 audit: BPF prog-id=101 op=UNLOAD Dec 13 15:58:58.364000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.364000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.364000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.364000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.364000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.364000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.364000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.364000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.364000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.364000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:58.364000 audit: BPF prog-id=103 op=LOAD Dec 13 15:58:58.364000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000247d8 items=0 ppid=2477 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:58.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396238343136636136323563353161366161643235313037366430 Dec 13 15:58:58.388389 env[1199]: time="2024-12-13T15:58:58.388348255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2hwng,Uid:ff02e76e-0863-40d1-a38d-ac080b991379,Namespace:calico-system,Attempt:1,} returns sandbox id \"0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486\"" Dec 13 15:58:58.390804 env[1199]: time="2024-12-13T15:58:58.390779080Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 15:58:58.751335 kubelet[1515]: E1213 15:58:58.751267 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:59.052522 systemd[1]: run-containerd-runc-k8s.io-0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486-runc.oJbuQN.mount: Deactivated successfully. Dec 13 15:58:59.676947 systemd-networkd[1019]: cali10fe7b94d16: Gained IPv6LL Dec 13 15:58:59.749890 env[1199]: time="2024-12-13T15:58:59.749782678Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:59.751452 kubelet[1515]: E1213 15:58:59.751401 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:58:59.753397 env[1199]: time="2024-12-13T15:58:59.753348613Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:59.755711 env[1199]: time="2024-12-13T15:58:59.755656587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:59.756137 env[1199]: time="2024-12-13T15:58:59.756108577Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:58:59.757179 env[1199]: time="2024-12-13T15:58:59.757151912Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 15:58:59.759282 env[1199]: time="2024-12-13T15:58:59.759252865Z" level=info msg="CreateContainer within sandbox \"0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 15:58:59.770192 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount254055035.mount: Deactivated successfully. Dec 13 15:58:59.774750 env[1199]: time="2024-12-13T15:58:59.774700402Z" level=info msg="CreateContainer within sandbox \"0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"54b139851f15196a6285785475f2c58178df236df13d29d3c8f6c98c9cb22504\"" Dec 13 15:58:59.775347 env[1199]: time="2024-12-13T15:58:59.775328119Z" level=info msg="StartContainer for \"54b139851f15196a6285785475f2c58178df236df13d29d3c8f6c98c9cb22504\"" Dec 13 15:58:59.797616 systemd[1]: Started cri-containerd-54b139851f15196a6285785475f2c58178df236df13d29d3c8f6c98c9cb22504.scope. Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9eb7d8d6a8 items=0 ppid=2477 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:59.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623133393835316631353139366136323835373835343735663263 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit: BPF prog-id=104 op=LOAD Dec 13 15:58:59.829000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000331bc8 items=0 ppid=2477 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:59.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623133393835316631353139366136323835373835343735663263 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit: BPF prog-id=105 op=LOAD Dec 13 15:58:59.829000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000331c18 items=0 ppid=2477 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:59.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623133393835316631353139366136323835373835343735663263 Dec 13 15:58:59.829000 audit: BPF prog-id=105 op=UNLOAD Dec 13 15:58:59.829000 audit: BPF prog-id=104 op=UNLOAD Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:58:59.829000 audit: BPF prog-id=106 op=LOAD Dec 13 15:58:59.829000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000331ca8 items=0 ppid=2477 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:59.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623133393835316631353139366136323835373835343735663263 Dec 13 15:58:59.848712 env[1199]: time="2024-12-13T15:58:59.848666014Z" level=info msg="StartContainer for \"54b139851f15196a6285785475f2c58178df236df13d29d3c8f6c98c9cb22504\" returns successfully" Dec 13 15:58:59.850012 env[1199]: time="2024-12-13T15:58:59.849987767Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 15:59:00.052582 systemd[1]: run-containerd-runc-k8s.io-54b139851f15196a6285785475f2c58178df236df13d29d3c8f6c98c9cb22504-runc.oXewt6.mount: Deactivated successfully. Dec 13 15:59:00.752578 kubelet[1515]: E1213 15:59:00.752372 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:01.457256 env[1199]: time="2024-12-13T15:59:01.457156637Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:01.458637 env[1199]: time="2024-12-13T15:59:01.458608090Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:01.460876 env[1199]: time="2024-12-13T15:59:01.460852766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:01.463792 env[1199]: time="2024-12-13T15:59:01.463725837Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:01.465732 env[1199]: time="2024-12-13T15:59:01.465633126Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 15:59:01.469783 env[1199]: time="2024-12-13T15:59:01.469517453Z" level=info msg="CreateContainer within sandbox \"0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 15:59:01.481099 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1209018704.mount: Deactivated successfully. Dec 13 15:59:01.494278 env[1199]: time="2024-12-13T15:59:01.494239118Z" level=info msg="CreateContainer within sandbox \"0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"0aa14039761952ff610aba7bb8c396cf758403b3905a681035c08523a743ca34\"" Dec 13 15:59:01.495130 env[1199]: time="2024-12-13T15:59:01.495093075Z" level=info msg="StartContainer for \"0aa14039761952ff610aba7bb8c396cf758403b3905a681035c08523a743ca34\"" Dec 13 15:59:01.527992 systemd[1]: Started cri-containerd-0aa14039761952ff610aba7bb8c396cf758403b3905a681035c08523a743ca34.scope. Dec 13 15:59:01.570000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.570000 audit[2559]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fecc04149b8 items=0 ppid=2477 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:01.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061613134303339373631393532666636313061626137626238633339 Dec 13 15:59:01.571000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.571000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.571000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.571000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.571000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.571000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.571000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.571000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.571000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.571000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.571000 audit: BPF prog-id=107 op=LOAD Dec 13 15:59:01.571000 audit[2559]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001b5598 items=0 ppid=2477 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:01.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061613134303339373631393532666636313061626137626238633339 Dec 13 15:59:01.572000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.572000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.572000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.572000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.572000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.572000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.572000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.572000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.572000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.572000 audit: BPF prog-id=108 op=LOAD Dec 13 15:59:01.572000 audit[2559]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001b55e8 items=0 ppid=2477 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:01.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061613134303339373631393532666636313061626137626238633339 Dec 13 15:59:01.573000 audit: BPF prog-id=108 op=UNLOAD Dec 13 15:59:01.573000 audit: BPF prog-id=107 op=UNLOAD Dec 13 15:59:01.573000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.573000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.573000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.573000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.573000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.573000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.573000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.573000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.573000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.573000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:01.573000 audit: BPF prog-id=109 op=LOAD Dec 13 15:59:01.573000 audit[2559]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001b5678 items=0 ppid=2477 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:01.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061613134303339373631393532666636313061626137626238633339 Dec 13 15:59:01.598550 env[1199]: time="2024-12-13T15:59:01.598483561Z" level=info msg="StartContainer for \"0aa14039761952ff610aba7bb8c396cf758403b3905a681035c08523a743ca34\" returns successfully" Dec 13 15:59:01.752664 kubelet[1515]: E1213 15:59:01.752623 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:01.827618 kubelet[1515]: I1213 15:59:01.827537 1515 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 15:59:01.829104 kubelet[1515]: I1213 15:59:01.829050 1515 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 15:59:02.021220 kubelet[1515]: I1213 15:59:02.021064 1515 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-2hwng" podStartSLOduration=27.944729629 podStartE2EDuration="31.02095254s" podCreationTimestamp="2024-12-13 15:58:31 +0000 UTC" firstStartedPulling="2024-12-13 15:58:58.390064628 +0000 UTC m=+27.228239843" lastFinishedPulling="2024-12-13 15:59:01.466287484 +0000 UTC m=+30.304462754" observedRunningTime="2024-12-13 15:59:02.02019464 +0000 UTC m=+30.858369928" watchObservedRunningTime="2024-12-13 15:59:02.02095254 +0000 UTC m=+30.859127799" Dec 13 15:59:02.481072 systemd[1]: run-containerd-runc-k8s.io-0aa14039761952ff610aba7bb8c396cf758403b3905a681035c08523a743ca34-runc.5D0ZvN.mount: Deactivated successfully. Dec 13 15:59:02.753229 kubelet[1515]: E1213 15:59:02.753165 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:02.878680 env[1199]: time="2024-12-13T15:59:02.875257255Z" level=info msg="StopPodSandbox for \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\"" Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.935 [INFO][2607] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.935 [INFO][2607] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" iface="eth0" netns="/var/run/netns/cni-9d61c408-469d-e6d7-01ed-cf00b025f953" Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.936 [INFO][2607] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" iface="eth0" netns="/var/run/netns/cni-9d61c408-469d-e6d7-01ed-cf00b025f953" Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.936 [INFO][2607] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" iface="eth0" netns="/var/run/netns/cni-9d61c408-469d-e6d7-01ed-cf00b025f953" Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.936 [INFO][2607] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.936 [INFO][2607] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.961 [INFO][2613] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" HandleID="k8s-pod-network.2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.961 [INFO][2613] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.961 [INFO][2613] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.977 [WARNING][2613] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" HandleID="k8s-pod-network.2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.977 [INFO][2613] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" HandleID="k8s-pod-network.2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.980 [INFO][2613] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:59:02.985097 env[1199]: 2024-12-13 15:59:02.982 [INFO][2607] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:02.989514 env[1199]: time="2024-12-13T15:59:02.987990217Z" level=info msg="TearDown network for sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\" successfully" Dec 13 15:59:02.989514 env[1199]: time="2024-12-13T15:59:02.988039387Z" level=info msg="StopPodSandbox for \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\" returns successfully" Dec 13 15:59:02.987796 systemd[1]: run-netns-cni\x2d9d61c408\x2d469d\x2de6d7\x2d01ed\x2dcf00b025f953.mount: Deactivated successfully. Dec 13 15:59:02.990400 env[1199]: time="2024-12-13T15:59:02.990359850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-rshns,Uid:202673e9-9494-453d-93e2-2e4a6e052528,Namespace:default,Attempt:1,}" Dec 13 15:59:03.157293 systemd-networkd[1019]: cali6b9ea3aa817: Link UP Dec 13 15:59:03.165631 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:59:03.165978 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6b9ea3aa817: link becomes ready Dec 13 15:59:03.167710 systemd-networkd[1019]: cali6b9ea3aa817: Gained carrier Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.043 [INFO][2619] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0 nginx-deployment-6d5f899847- default 202673e9-9494-453d-93e2-2e4a6e052528 1219 0 2024-12-13 15:58:51 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.244.97.146 nginx-deployment-6d5f899847-rshns eth0 default [] [] [kns.default ksa.default.default] cali6b9ea3aa817 [] []}} ContainerID="f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" Namespace="default" Pod="nginx-deployment-6d5f899847-rshns" WorkloadEndpoint="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.043 [INFO][2619] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" Namespace="default" Pod="nginx-deployment-6d5f899847-rshns" WorkloadEndpoint="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.083 [INFO][2631] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" HandleID="k8s-pod-network.f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.096 [INFO][2631] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" HandleID="k8s-pod-network.f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004d9e50), Attrs:map[string]string{"namespace":"default", "node":"10.244.97.146", "pod":"nginx-deployment-6d5f899847-rshns", "timestamp":"2024-12-13 15:59:03.083392744 +0000 UTC"}, Hostname:"10.244.97.146", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.097 [INFO][2631] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.097 [INFO][2631] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.097 [INFO][2631] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.97.146' Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.099 [INFO][2631] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" host="10.244.97.146" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.108 [INFO][2631] ipam/ipam.go 372: Looking up existing affinities for host host="10.244.97.146" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.116 [INFO][2631] ipam/ipam.go 489: Trying affinity for 192.168.122.192/26 host="10.244.97.146" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.120 [INFO][2631] ipam/ipam.go 155: Attempting to load block cidr=192.168.122.192/26 host="10.244.97.146" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.124 [INFO][2631] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.122.192/26 host="10.244.97.146" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.125 [INFO][2631] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.122.192/26 handle="k8s-pod-network.f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" host="10.244.97.146" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.128 [INFO][2631] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.134 [INFO][2631] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.122.192/26 handle="k8s-pod-network.f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" host="10.244.97.146" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.144 [INFO][2631] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.122.194/26] block=192.168.122.192/26 handle="k8s-pod-network.f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" host="10.244.97.146" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.144 [INFO][2631] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.122.194/26] handle="k8s-pod-network.f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" host="10.244.97.146" Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.144 [INFO][2631] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:59:03.183215 env[1199]: 2024-12-13 15:59:03.144 [INFO][2631] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.194/26] IPv6=[] ContainerID="f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" HandleID="k8s-pod-network.f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:03.184226 env[1199]: 2024-12-13 15:59:03.147 [INFO][2619] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" Namespace="default" Pod="nginx-deployment-6d5f899847-rshns" WorkloadEndpoint="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"202673e9-9494-453d-93e2-2e4a6e052528", ResourceVersion:"1219", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 58, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"", Pod:"nginx-deployment-6d5f899847-rshns", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6b9ea3aa817", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:59:03.184226 env[1199]: 2024-12-13 15:59:03.147 [INFO][2619] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.122.194/32] ContainerID="f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" Namespace="default" Pod="nginx-deployment-6d5f899847-rshns" WorkloadEndpoint="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:03.184226 env[1199]: 2024-12-13 15:59:03.147 [INFO][2619] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6b9ea3aa817 ContainerID="f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" Namespace="default" Pod="nginx-deployment-6d5f899847-rshns" WorkloadEndpoint="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:03.184226 env[1199]: 2024-12-13 15:59:03.158 [INFO][2619] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" Namespace="default" Pod="nginx-deployment-6d5f899847-rshns" WorkloadEndpoint="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:03.184226 env[1199]: 2024-12-13 15:59:03.169 [INFO][2619] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" Namespace="default" Pod="nginx-deployment-6d5f899847-rshns" WorkloadEndpoint="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"202673e9-9494-453d-93e2-2e4a6e052528", ResourceVersion:"1219", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 58, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a", Pod:"nginx-deployment-6d5f899847-rshns", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6b9ea3aa817", MAC:"3e:f2:49:b5:d8:fb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:59:03.184226 env[1199]: 2024-12-13 15:59:03.179 [INFO][2619] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a" Namespace="default" Pod="nginx-deployment-6d5f899847-rshns" WorkloadEndpoint="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:03.206000 audit[2654]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2654 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:59:03.206000 audit[2654]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fffa586e390 a2=0 a3=7fffa586e37c items=0 ppid=2198 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:03.206000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:59:03.208448 env[1199]: time="2024-12-13T15:59:03.208370694Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:59:03.208448 env[1199]: time="2024-12-13T15:59:03.208417303Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:59:03.208448 env[1199]: time="2024-12-13T15:59:03.208429334Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:59:03.208895 env[1199]: time="2024-12-13T15:59:03.208843762Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a pid=2662 runtime=io.containerd.runc.v2 Dec 13 15:59:03.229282 systemd[1]: Started cri-containerd-f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a.scope. Dec 13 15:59:03.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.249000 audit: BPF prog-id=110 op=LOAD Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2662 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:03.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635626338353362383937373664353163336333616364356666643463 Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2662 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:03.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635626338353362383937373664353163336333616364356666643463 Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.251000 audit: BPF prog-id=111 op=LOAD Dec 13 15:59:03.251000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000212a00 items=0 ppid=2662 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:03.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635626338353362383937373664353163336333616364356666643463 Dec 13 15:59:03.252000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.252000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.252000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.252000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.252000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.252000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.252000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.252000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.252000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.252000 audit: BPF prog-id=112 op=LOAD Dec 13 15:59:03.252000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000212a48 items=0 ppid=2662 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:03.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635626338353362383937373664353163336333616364356666643463 Dec 13 15:59:03.253000 audit: BPF prog-id=112 op=UNLOAD Dec 13 15:59:03.253000 audit: BPF prog-id=111 op=UNLOAD Dec 13 15:59:03.253000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.253000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.253000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.253000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.253000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.253000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.253000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.253000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.253000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.253000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:03.253000 audit: BPF prog-id=113 op=LOAD Dec 13 15:59:03.253000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000212e58 items=0 ppid=2662 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:03.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635626338353362383937373664353163336333616364356666643463 Dec 13 15:59:03.289387 env[1199]: time="2024-12-13T15:59:03.289335560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-rshns,Uid:202673e9-9494-453d-93e2-2e4a6e052528,Namespace:default,Attempt:1,} returns sandbox id \"f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a\"" Dec 13 15:59:03.290869 env[1199]: time="2024-12-13T15:59:03.290842573Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 15:59:03.754396 kubelet[1515]: E1213 15:59:03.754320 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:04.352028 systemd-networkd[1019]: cali6b9ea3aa817: Gained IPv6LL Dec 13 15:59:04.755857 kubelet[1515]: E1213 15:59:04.755808 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:05.756219 kubelet[1515]: E1213 15:59:05.756130 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:06.757257 kubelet[1515]: E1213 15:59:06.757145 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:06.937894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2578218488.mount: Deactivated successfully. Dec 13 15:59:07.758016 kubelet[1515]: E1213 15:59:07.757941 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:08.582822 env[1199]: time="2024-12-13T15:59:08.582743079Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:08.584698 env[1199]: time="2024-12-13T15:59:08.584662680Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:08.586677 env[1199]: time="2024-12-13T15:59:08.586632381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:08.589801 env[1199]: time="2024-12-13T15:59:08.589765526Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:08.592567 env[1199]: time="2024-12-13T15:59:08.592453024Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 15:59:08.597258 env[1199]: time="2024-12-13T15:59:08.597190041Z" level=info msg="CreateContainer within sandbox \"f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 15:59:08.610850 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2610689307.mount: Deactivated successfully. Dec 13 15:59:08.625548 env[1199]: time="2024-12-13T15:59:08.625459212Z" level=info msg="CreateContainer within sandbox \"f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"be8f268fb24635b9edbb7b917580da02efa540ee118625852f6e8683a100112d\"" Dec 13 15:59:08.627115 env[1199]: time="2024-12-13T15:59:08.627074755Z" level=info msg="StartContainer for \"be8f268fb24635b9edbb7b917580da02efa540ee118625852f6e8683a100112d\"" Dec 13 15:59:08.658726 systemd[1]: Started cri-containerd-be8f268fb24635b9edbb7b917580da02efa540ee118625852f6e8683a100112d.scope. Dec 13 15:59:08.691668 kernel: kauditd_printk_skb: 196 callbacks suppressed Dec 13 15:59:08.692662 kernel: audit: type=1400 audit(1734105548.676:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.692756 kernel: audit: type=1400 audit(1734105548.676:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.692792 kernel: audit: type=1400 audit(1734105548.676:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.692844 kernel: audit: type=1400 audit(1734105548.676:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.696686 kernel: audit: type=1400 audit(1734105548.676:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.696778 kernel: audit: type=1400 audit(1734105548.676:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.703559 kernel: audit: type=1400 audit(1734105548.676:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.719211 kernel: audit: type=1400 audit(1734105548.676:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.719330 kernel: audit: type=1400 audit(1734105548.676:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.719378 kernel: audit: type=1400 audit(1734105548.676:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.676000 audit: BPF prog-id=114 op=LOAD Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2662 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:08.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265386632363866623234363335623965646262376239313735383064 Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2662 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:08.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265386632363866623234363335623965646262376239313735383064 Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.680000 audit: BPF prog-id=115 op=LOAD Dec 13 15:59:08.680000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000350b60 items=0 ppid=2662 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:08.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265386632363866623234363335623965646262376239313735383064 Dec 13 15:59:08.683000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.683000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.683000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.683000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.683000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.683000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.683000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.683000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.683000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.683000 audit: BPF prog-id=116 op=LOAD Dec 13 15:59:08.683000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000350ba8 items=0 ppid=2662 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:08.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265386632363866623234363335623965646262376239313735383064 Dec 13 15:59:08.688000 audit: BPF prog-id=116 op=UNLOAD Dec 13 15:59:08.688000 audit: BPF prog-id=115 op=UNLOAD Dec 13 15:59:08.688000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.688000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.688000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.688000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.688000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.688000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.688000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.688000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.688000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.688000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:08.688000 audit: BPF prog-id=117 op=LOAD Dec 13 15:59:08.688000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000350fb8 items=0 ppid=2662 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:08.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265386632363866623234363335623965646262376239313735383064 Dec 13 15:59:08.729401 env[1199]: time="2024-12-13T15:59:08.729347258Z" level=info msg="StartContainer for \"be8f268fb24635b9edbb7b917580da02efa540ee118625852f6e8683a100112d\" returns successfully" Dec 13 15:59:08.759139 kubelet[1515]: E1213 15:59:08.759040 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:09.047133 kubelet[1515]: I1213 15:59:09.047095 1515 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-rshns" podStartSLOduration=12.744070045 podStartE2EDuration="18.046970645s" podCreationTimestamp="2024-12-13 15:58:51 +0000 UTC" firstStartedPulling="2024-12-13 15:59:03.290452847 +0000 UTC m=+32.128628068" lastFinishedPulling="2024-12-13 15:59:08.593353385 +0000 UTC m=+37.431528668" observedRunningTime="2024-12-13 15:59:09.04587957 +0000 UTC m=+37.884054844" watchObservedRunningTime="2024-12-13 15:59:09.046970645 +0000 UTC m=+37.885145909" Dec 13 15:59:09.760133 kubelet[1515]: E1213 15:59:09.760059 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:10.762444 kubelet[1515]: E1213 15:59:10.762353 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:11.720598 kubelet[1515]: E1213 15:59:11.720464 1515 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:11.764251 kubelet[1515]: E1213 15:59:11.764089 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:12.765066 kubelet[1515]: E1213 15:59:12.764957 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:13.766980 kubelet[1515]: E1213 15:59:13.766886 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:14.767594 kubelet[1515]: E1213 15:59:14.767534 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:15.769574 kubelet[1515]: E1213 15:59:15.769481 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:16.771300 kubelet[1515]: E1213 15:59:16.771226 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:17.772322 kubelet[1515]: E1213 15:59:17.772176 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:18.772879 kubelet[1515]: E1213 15:59:18.772791 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:19.773797 kubelet[1515]: E1213 15:59:19.773557 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:20.344000 audit[2794]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.355348 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 15:59:20.355471 kernel: audit: type=1325 audit(1734105560.344:719): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.344000 audit[2794]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe44696190 a2=0 a3=7ffe4469617c items=0 ppid=1668 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.363394 kernel: audit: type=1300 audit(1734105560.344:719): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe44696190 a2=0 a3=7ffe4469617c items=0 ppid=1668 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.363474 kernel: audit: type=1327 audit(1734105560.344:719): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.365000 audit[2794]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.365000 audit[2794]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe44696190 a2=0 a3=0 items=0 ppid=1668 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.374341 kernel: audit: type=1325 audit(1734105560.365:720): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.374415 kernel: audit: type=1300 audit(1734105560.365:720): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe44696190 a2=0 a3=0 items=0 ppid=1668 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.374460 kernel: audit: type=1327 audit(1734105560.365:720): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.380000 audit[2798]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.380000 audit[2798]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd75a9f6e0 a2=0 a3=7ffd75a9f6cc items=0 ppid=1668 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.389056 kernel: audit: type=1325 audit(1734105560.380:721): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.389148 kernel: audit: type=1300 audit(1734105560.380:721): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd75a9f6e0 a2=0 a3=7ffd75a9f6cc items=0 ppid=1668 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.389190 kernel: audit: type=1327 audit(1734105560.380:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.391984 kernel: audit: type=1325 audit(1734105560.390:722): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.390000 audit[2798]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.390000 audit[2798]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd75a9f6e0 a2=0 a3=0 items=0 ppid=1668 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.459766 kubelet[1515]: I1213 15:59:20.458061 1515 topology_manager.go:215] "Topology Admit Handler" podUID="81c84714-65d1-4fc8-af23-2de0dd69f417" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 15:59:20.471100 systemd[1]: Created slice kubepods-besteffort-pod81c84714_65d1_4fc8_af23_2de0dd69f417.slice. Dec 13 15:59:20.575309 kubelet[1515]: I1213 15:59:20.575239 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/81c84714-65d1-4fc8-af23-2de0dd69f417-data\") pod \"nfs-server-provisioner-0\" (UID: \"81c84714-65d1-4fc8-af23-2de0dd69f417\") " pod="default/nfs-server-provisioner-0" Dec 13 15:59:20.575676 kubelet[1515]: I1213 15:59:20.575404 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fwx28\" (UniqueName: \"kubernetes.io/projected/81c84714-65d1-4fc8-af23-2de0dd69f417-kube-api-access-fwx28\") pod \"nfs-server-provisioner-0\" (UID: \"81c84714-65d1-4fc8-af23-2de0dd69f417\") " pod="default/nfs-server-provisioner-0" Dec 13 15:59:20.774430 kubelet[1515]: E1213 15:59:20.774379 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:20.776674 env[1199]: time="2024-12-13T15:59:20.776004077Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:81c84714-65d1-4fc8-af23-2de0dd69f417,Namespace:default,Attempt:0,}" Dec 13 15:59:20.960185 systemd-networkd[1019]: cali60e51b789ff: Link UP Dec 13 15:59:20.964027 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:59:20.964117 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 15:59:20.964245 systemd-networkd[1019]: cali60e51b789ff: Gained carrier Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.835 [INFO][2800] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.97.146-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 81c84714-65d1-4fc8-af23-2de0dd69f417 1286 0 2024-12-13 15:59:20 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.244.97.146 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.146-k8s-nfs--server--provisioner--0-" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.836 [INFO][2800] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.146-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.880 [INFO][2812] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" HandleID="k8s-pod-network.cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" Workload="10.244.97.146-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.894 [INFO][2812] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" HandleID="k8s-pod-network.cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" Workload="10.244.97.146-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ef1b0), Attrs:map[string]string{"namespace":"default", "node":"10.244.97.146", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 15:59:20.880155574 +0000 UTC"}, Hostname:"10.244.97.146", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.895 [INFO][2812] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.895 [INFO][2812] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.895 [INFO][2812] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.97.146' Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.898 [INFO][2812] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" host="10.244.97.146" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.904 [INFO][2812] ipam/ipam.go 372: Looking up existing affinities for host host="10.244.97.146" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.912 [INFO][2812] ipam/ipam.go 489: Trying affinity for 192.168.122.192/26 host="10.244.97.146" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.916 [INFO][2812] ipam/ipam.go 155: Attempting to load block cidr=192.168.122.192/26 host="10.244.97.146" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.920 [INFO][2812] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.122.192/26 host="10.244.97.146" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.920 [INFO][2812] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.122.192/26 handle="k8s-pod-network.cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" host="10.244.97.146" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.923 [INFO][2812] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.934 [INFO][2812] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.122.192/26 handle="k8s-pod-network.cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" host="10.244.97.146" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.946 [INFO][2812] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.122.195/26] block=192.168.122.192/26 handle="k8s-pod-network.cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" host="10.244.97.146" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.946 [INFO][2812] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.122.195/26] handle="k8s-pod-network.cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" host="10.244.97.146" Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.946 [INFO][2812] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:59:20.976835 env[1199]: 2024-12-13 15:59:20.946 [INFO][2812] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.195/26] IPv6=[] ContainerID="cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" HandleID="k8s-pod-network.cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" Workload="10.244.97.146-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:59:20.977640 env[1199]: 2024-12-13 15:59:20.950 [INFO][2800] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.146-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"81c84714-65d1-4fc8-af23-2de0dd69f417", ResourceVersion:"1286", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 59, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.122.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:59:20.977640 env[1199]: 2024-12-13 15:59:20.950 [INFO][2800] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.122.195/32] ContainerID="cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.146-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:59:20.977640 env[1199]: 2024-12-13 15:59:20.950 [INFO][2800] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.146-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:59:20.977640 env[1199]: 2024-12-13 15:59:20.964 [INFO][2800] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.146-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:59:20.977911 env[1199]: 2024-12-13 15:59:20.964 [INFO][2800] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.146-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"81c84714-65d1-4fc8-af23-2de0dd69f417", ResourceVersion:"1286", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 59, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.122.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"4a:6a:64:0f:41:b2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:59:20.977911 env[1199]: 2024-12-13 15:59:20.974 [INFO][2800] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.146-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:59:20.999808 env[1199]: time="2024-12-13T15:59:20.999725855Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:59:20.999985 env[1199]: time="2024-12-13T15:59:20.999814947Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:59:20.999985 env[1199]: time="2024-12-13T15:59:20.999838610Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:59:21.000209 env[1199]: time="2024-12-13T15:59:21.000166128Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e pid=2840 runtime=io.containerd.runc.v2 Dec 13 15:59:21.008000 audit[2844]: NETFILTER_CFG table=filter:75 family=2 entries=44 op=nft_register_chain pid=2844 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:59:21.008000 audit[2844]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7fffd2178700 a2=0 a3=7fffd21786ec items=0 ppid=2198 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:21.008000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:59:21.015172 systemd[1]: Started cri-containerd-cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e.scope. Dec 13 15:59:21.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.031000 audit: BPF prog-id=118 op=LOAD Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2840 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:21.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363386666366539393032666531666335396630643539386165653566 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2840 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:21.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363386666366539393032666531666335396630643539386165653566 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit: BPF prog-id=119 op=LOAD Dec 13 15:59:21.032000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021d940 items=0 ppid=2840 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:21.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363386666366539393032666531666335396630643539386165653566 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit: BPF prog-id=120 op=LOAD Dec 13 15:59:21.032000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021d988 items=0 ppid=2840 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:21.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363386666366539393032666531666335396630643539386165653566 Dec 13 15:59:21.032000 audit: BPF prog-id=120 op=UNLOAD Dec 13 15:59:21.032000 audit: BPF prog-id=119 op=UNLOAD Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:21.032000 audit: BPF prog-id=121 op=LOAD Dec 13 15:59:21.032000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021dd98 items=0 ppid=2840 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:21.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363386666366539393032666531666335396630643539386165653566 Dec 13 15:59:21.074425 env[1199]: time="2024-12-13T15:59:21.073192791Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:81c84714-65d1-4fc8-af23-2de0dd69f417,Namespace:default,Attempt:0,} returns sandbox id \"cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e\"" Dec 13 15:59:21.076442 env[1199]: time="2024-12-13T15:59:21.076418235Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 15:59:21.776026 kubelet[1515]: E1213 15:59:21.775969 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:22.141064 systemd-networkd[1019]: cali60e51b789ff: Gained IPv6LL Dec 13 15:59:22.777189 kubelet[1515]: E1213 15:59:22.777069 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:23.777986 kubelet[1515]: E1213 15:59:23.777937 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:24.738258 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1364140272.mount: Deactivated successfully. Dec 13 15:59:24.778575 kubelet[1515]: E1213 15:59:24.778499 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:25.779190 kubelet[1515]: E1213 15:59:25.779009 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:26.779798 kubelet[1515]: E1213 15:59:26.779745 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:27.063036 env[1199]: time="2024-12-13T15:59:27.062675628Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:27.064070 env[1199]: time="2024-12-13T15:59:27.064034596Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:27.066222 env[1199]: time="2024-12-13T15:59:27.066178794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:27.068161 env[1199]: time="2024-12-13T15:59:27.068123193Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:27.069188 env[1199]: time="2024-12-13T15:59:27.069145493Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 15:59:27.072571 env[1199]: time="2024-12-13T15:59:27.072544607Z" level=info msg="CreateContainer within sandbox \"cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 15:59:27.089726 env[1199]: time="2024-12-13T15:59:27.089620701Z" level=info msg="CreateContainer within sandbox \"cc8ff6e9902fe1fc59f0d598aee5f2a10114bbd7d1d731de7a8e6b291aff6d0e\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"1f38c15e77c3541b6b52cdeb49e440d37cf3a3d1d42f9610b1c3fe91c9eafb70\"" Dec 13 15:59:27.090788 env[1199]: time="2024-12-13T15:59:27.090752634Z" level=info msg="StartContainer for \"1f38c15e77c3541b6b52cdeb49e440d37cf3a3d1d42f9610b1c3fe91c9eafb70\"" Dec 13 15:59:27.131124 systemd[1]: Started cri-containerd-1f38c15e77c3541b6b52cdeb49e440d37cf3a3d1d42f9610b1c3fe91c9eafb70.scope. Dec 13 15:59:27.165001 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 15:59:27.165191 kernel: audit: type=1400 audit(1734105567.156:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.165231 kernel: audit: type=1400 audit(1734105567.156:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.168084 kernel: audit: type=1400 audit(1734105567.156:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.170905 kernel: audit: type=1400 audit(1734105567.156:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.173668 kernel: audit: type=1400 audit(1734105567.156:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.176541 kernel: audit: type=1400 audit(1734105567.156:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.179425 kernel: audit: type=1400 audit(1734105567.156:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.182529 kernel: audit: type=1400 audit(1734105567.156:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.186621 kernel: audit: type=1400 audit(1734105567.156:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.163000 audit: BPF prog-id=122 op=LOAD Dec 13 15:59:27.190545 kernel: audit: type=1400 audit(1734105567.163:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2840 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:27.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166333863313565373763333534316236623532636465623439653434 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2840 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:27.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166333863313565373763333534316236623532636465623439653434 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.164000 audit: BPF prog-id=123 op=LOAD Dec 13 15:59:27.164000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000388370 items=0 ppid=2840 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:27.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166333863313565373763333534316236623532636465623439653434 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit: BPF prog-id=124 op=LOAD Dec 13 15:59:27.166000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003883b8 items=0 ppid=2840 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:27.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166333863313565373763333534316236623532636465623439653434 Dec 13 15:59:27.166000 audit: BPF prog-id=124 op=UNLOAD Dec 13 15:59:27.166000 audit: BPF prog-id=123 op=UNLOAD Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:27.166000 audit: BPF prog-id=125 op=LOAD Dec 13 15:59:27.166000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003887c8 items=0 ppid=2840 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:27.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166333863313565373763333534316236623532636465623439653434 Dec 13 15:59:27.200223 env[1199]: time="2024-12-13T15:59:27.200184266Z" level=info msg="StartContainer for \"1f38c15e77c3541b6b52cdeb49e440d37cf3a3d1d42f9610b1c3fe91c9eafb70\" returns successfully" Dec 13 15:59:27.246000 audit[2915]: AVC avc: denied { search } for pid=2915 comm="rpcbind" name="crypto" dev="proc" ino=24182 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c260 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 15:59:27.246000 audit[2915]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f1ca201e0c0 a2=0 a3=0 items=0 ppid=2896 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c260 key=(null) Dec 13 15:59:27.246000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 15:59:27.293000 audit[2920]: AVC avc: denied { search } for pid=2920 comm="dbus-daemon" name="crypto" dev="proc" ino=24182 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c260 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 15:59:27.293000 audit[2920]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f13b7d590c0 a2=0 a3=0 items=0 ppid=2896 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c260 key=(null) Dec 13 15:59:27.293000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 15:59:27.298000 audit[2921]: AVC avc: denied { watch } for pid=2921 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538733 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c260 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c260 tclass=dir permissive=0 Dec 13 15:59:27.298000 audit[2921]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=561cd4ac4040 a2=2c8 a3=7ffdd6046c1c items=0 ppid=2896 pid=2921 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c260 key=(null) Dec 13 15:59:27.298000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 15:59:27.301000 audit[2922]: AVC avc: denied { read } for pid=2922 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c260 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 15:59:27.301000 audit[2922]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f368cda7320 a1=80000 a2=d a3=7fff82c71240 items=0 ppid=2896 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c260 key=(null) Dec 13 15:59:27.301000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 15:59:27.303000 audit[2922]: AVC avc: denied { search } for pid=2922 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24182 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c260 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 15:59:27.303000 audit[2922]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f368c2fb0c0 a2=0 a3=0 items=0 ppid=2896 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c260 key=(null) Dec 13 15:59:27.303000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 15:59:27.780296 kubelet[1515]: E1213 15:59:27.780176 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:28.084953 systemd[1]: run-containerd-runc-k8s.io-1f38c15e77c3541b6b52cdeb49e440d37cf3a3d1d42f9610b1c3fe91c9eafb70-runc.rGBGcX.mount: Deactivated successfully. Dec 13 15:59:28.114537 kubelet[1515]: I1213 15:59:28.114368 1515 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.120461681 podStartE2EDuration="8.114300128s" podCreationTimestamp="2024-12-13 15:59:20 +0000 UTC" firstStartedPulling="2024-12-13 15:59:21.075644472 +0000 UTC m=+49.913819687" lastFinishedPulling="2024-12-13 15:59:27.069482895 +0000 UTC m=+55.907658134" observedRunningTime="2024-12-13 15:59:28.11360619 +0000 UTC m=+56.951781415" watchObservedRunningTime="2024-12-13 15:59:28.114300128 +0000 UTC m=+56.952475354" Dec 13 15:59:28.150000 audit[2988]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:28.150000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffefc953a20 a2=0 a3=7ffefc953a0c items=0 ppid=1668 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:28.150000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:28.159000 audit[2988]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:28.159000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffefc953a20 a2=0 a3=7ffefc953a0c items=0 ppid=1668 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:28.159000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:28.780490 kubelet[1515]: E1213 15:59:28.780391 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:29.781227 kubelet[1515]: E1213 15:59:29.781123 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:30.782324 kubelet[1515]: E1213 15:59:30.782230 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:31.720687 kubelet[1515]: E1213 15:59:31.720576 1515 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:31.746730 env[1199]: time="2024-12-13T15:59:31.746660096Z" level=info msg="StopPodSandbox for \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\"" Dec 13 15:59:31.783116 kubelet[1515]: E1213 15:59:31.783083 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.808 [WARNING][3004] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-csi--node--driver--2hwng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ff02e76e-0863-40d1-a38d-ac080b991379", ResourceVersion:"1212", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 58, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486", Pod:"csi-node-driver-2hwng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali10fe7b94d16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.809 [INFO][3004] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.809 [INFO][3004] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" iface="eth0" netns="" Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.809 [INFO][3004] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.809 [INFO][3004] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.841 [INFO][3011] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" HandleID="k8s-pod-network.a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.841 [INFO][3011] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.842 [INFO][3011] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.851 [WARNING][3011] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" HandleID="k8s-pod-network.a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.851 [INFO][3011] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" HandleID="k8s-pod-network.a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.853 [INFO][3011] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:59:31.856997 env[1199]: 2024-12-13 15:59:31.855 [INFO][3004] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:59:31.858262 env[1199]: time="2024-12-13T15:59:31.857809742Z" level=info msg="TearDown network for sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\" successfully" Dec 13 15:59:31.858262 env[1199]: time="2024-12-13T15:59:31.857849787Z" level=info msg="StopPodSandbox for \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\" returns successfully" Dec 13 15:59:31.859189 env[1199]: time="2024-12-13T15:59:31.859126635Z" level=info msg="RemovePodSandbox for \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\"" Dec 13 15:59:31.859302 env[1199]: time="2024-12-13T15:59:31.859207484Z" level=info msg="Forcibly stopping sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\"" Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.913 [WARNING][3032] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-csi--node--driver--2hwng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ff02e76e-0863-40d1-a38d-ac080b991379", ResourceVersion:"1212", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 58, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"0b9b8416ca625c51a6aad251076d0fbf09dbd6d52f621506828c645b21b7c486", Pod:"csi-node-driver-2hwng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali10fe7b94d16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.914 [INFO][3032] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.914 [INFO][3032] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" iface="eth0" netns="" Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.914 [INFO][3032] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.914 [INFO][3032] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.950 [INFO][3041] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" HandleID="k8s-pod-network.a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.951 [INFO][3041] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.951 [INFO][3041] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.961 [WARNING][3041] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" HandleID="k8s-pod-network.a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.961 [INFO][3041] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" HandleID="k8s-pod-network.a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Workload="10.244.97.146-k8s-csi--node--driver--2hwng-eth0" Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.964 [INFO][3041] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:59:31.966306 env[1199]: 2024-12-13 15:59:31.965 [INFO][3032] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d" Dec 13 15:59:31.967158 env[1199]: time="2024-12-13T15:59:31.966336315Z" level=info msg="TearDown network for sandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\" successfully" Dec 13 15:59:31.968449 env[1199]: time="2024-12-13T15:59:31.968404860Z" level=info msg="RemovePodSandbox \"a06149d920c8b0c8bfa9787670beae9e7effa5a7a4e898bea64471bc747e245d\" returns successfully" Dec 13 15:59:31.969084 env[1199]: time="2024-12-13T15:59:31.969047326Z" level=info msg="StopPodSandbox for \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\"" Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.022 [WARNING][3060] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"202673e9-9494-453d-93e2-2e4a6e052528", ResourceVersion:"1239", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 58, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a", Pod:"nginx-deployment-6d5f899847-rshns", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6b9ea3aa817", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.022 [INFO][3060] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.024 [INFO][3060] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" iface="eth0" netns="" Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.024 [INFO][3060] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.025 [INFO][3060] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.063 [INFO][3066] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" HandleID="k8s-pod-network.2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.063 [INFO][3066] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.063 [INFO][3066] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.075 [WARNING][3066] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" HandleID="k8s-pod-network.2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.075 [INFO][3066] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" HandleID="k8s-pod-network.2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.079 [INFO][3066] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:59:32.082890 env[1199]: 2024-12-13 15:59:32.080 [INFO][3060] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:32.084784 env[1199]: time="2024-12-13T15:59:32.082949911Z" level=info msg="TearDown network for sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\" successfully" Dec 13 15:59:32.084784 env[1199]: time="2024-12-13T15:59:32.083026492Z" level=info msg="StopPodSandbox for \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\" returns successfully" Dec 13 15:59:32.084784 env[1199]: time="2024-12-13T15:59:32.084352193Z" level=info msg="RemovePodSandbox for \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\"" Dec 13 15:59:32.084784 env[1199]: time="2024-12-13T15:59:32.084437458Z" level=info msg="Forcibly stopping sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\"" Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.139 [WARNING][3085] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"202673e9-9494-453d-93e2-2e4a6e052528", ResourceVersion:"1239", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 58, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"f5bc853b89776d51c3c3acd5ffd4ce2a3d144d337a4cff32c1fe383b8fd8ad9a", Pod:"nginx-deployment-6d5f899847-rshns", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6b9ea3aa817", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.139 [INFO][3085] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.139 [INFO][3085] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" iface="eth0" netns="" Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.139 [INFO][3085] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.139 [INFO][3085] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.176 [INFO][3092] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" HandleID="k8s-pod-network.2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.176 [INFO][3092] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.176 [INFO][3092] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.192 [WARNING][3092] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" HandleID="k8s-pod-network.2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.192 [INFO][3092] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" HandleID="k8s-pod-network.2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Workload="10.244.97.146-k8s-nginx--deployment--6d5f899847--rshns-eth0" Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.196 [INFO][3092] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:59:32.199637 env[1199]: 2024-12-13 15:59:32.198 [INFO][3085] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207" Dec 13 15:59:32.201310 env[1199]: time="2024-12-13T15:59:32.201240186Z" level=info msg="TearDown network for sandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\" successfully" Dec 13 15:59:32.205623 env[1199]: time="2024-12-13T15:59:32.205494160Z" level=info msg="RemovePodSandbox \"2badc873654d59a139a27e5009997c82ecfed405644794d1987589dc20f8a207\" returns successfully" Dec 13 15:59:32.784328 kubelet[1515]: E1213 15:59:32.784260 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:33.785181 kubelet[1515]: E1213 15:59:33.785095 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:34.786284 kubelet[1515]: E1213 15:59:34.786230 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:35.787499 kubelet[1515]: E1213 15:59:35.787407 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:36.788083 kubelet[1515]: E1213 15:59:36.788003 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:36.953550 kubelet[1515]: I1213 15:59:36.953468 1515 topology_manager.go:215] "Topology Admit Handler" podUID="fab02d4c-17d0-4c89-a3c3-133d80d6e313" podNamespace="default" podName="test-pod-1" Dec 13 15:59:36.962668 systemd[1]: Created slice kubepods-besteffort-podfab02d4c_17d0_4c89_a3c3_133d80d6e313.slice. Dec 13 15:59:37.090763 kubelet[1515]: I1213 15:59:37.090122 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-0230904e-5566-4ee5-87f6-0d7d3d0e0cf2\" (UniqueName: \"kubernetes.io/nfs/fab02d4c-17d0-4c89-a3c3-133d80d6e313-pvc-0230904e-5566-4ee5-87f6-0d7d3d0e0cf2\") pod \"test-pod-1\" (UID: \"fab02d4c-17d0-4c89-a3c3-133d80d6e313\") " pod="default/test-pod-1" Dec 13 15:59:37.090763 kubelet[1515]: I1213 15:59:37.090220 1515 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pqlnm\" (UniqueName: \"kubernetes.io/projected/fab02d4c-17d0-4c89-a3c3-133d80d6e313-kube-api-access-pqlnm\") pod \"test-pod-1\" (UID: \"fab02d4c-17d0-4c89-a3c3-133d80d6e313\") " pod="default/test-pod-1" Dec 13 15:59:37.237163 kernel: Failed to create system directory netfs Dec 13 15:59:37.237353 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 15:59:37.237382 kernel: audit: type=1400 audit(1734105577.227:767): avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.227000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.246111 kernel: Failed to create system directory netfs Dec 13 15:59:37.246216 kernel: audit: type=1400 audit(1734105577.227:767): avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.246243 kernel: Failed to create system directory netfs Dec 13 15:59:37.246276 kernel: audit: type=1400 audit(1734105577.227:767): avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.246298 kernel: Failed to create system directory netfs Dec 13 15:59:37.227000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.227000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.250182 kernel: audit: type=1400 audit(1734105577.227:767): avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.227000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.227000 audit[3110]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5619ab92b5e0 a1=153bc a2=56199a3712b0 a3=5 items=0 ppid=50 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.227000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:59:37.257585 kernel: audit: type=1300 audit(1734105577.227:767): arch=c000003e syscall=175 success=yes exit=0 a0=5619ab92b5e0 a1=153bc a2=56199a3712b0 a3=5 items=0 ppid=50 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.257651 kernel: audit: type=1327 audit(1734105577.227:767): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:59:37.273228 kernel: Failed to create system directory fscache Dec 13 15:59:37.273421 kernel: audit: type=1400 audit(1734105577.261:768): avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.273491 kernel: Failed to create system directory fscache Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.279443 kernel: audit: type=1400 audit(1734105577.261:768): avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.279560 kernel: Failed to create system directory fscache Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.283671 kernel: audit: type=1400 audit(1734105577.261:768): avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.283726 kernel: Failed to create system directory fscache Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.287524 kernel: audit: type=1400 audit(1734105577.261:768): avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.287557 kernel: Failed to create system directory fscache Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.288526 kernel: Failed to create system directory fscache Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.289867 kernel: Failed to create system directory fscache Dec 13 15:59:37.289907 kernel: Failed to create system directory fscache Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.292241 kernel: Failed to create system directory fscache Dec 13 15:59:37.292342 kernel: Failed to create system directory fscache Dec 13 15:59:37.292372 kernel: Failed to create system directory fscache Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.293750 kernel: Failed to create system directory fscache Dec 13 15:59:37.293812 kernel: Failed to create system directory fscache Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.261000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.295527 kernel: Failed to create system directory fscache Dec 13 15:59:37.297547 kernel: FS-Cache: Loaded Dec 13 15:59:37.261000 audit[3110]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5619abb409c0 a1=4c0fc a2=56199a3712b0 a3=5 items=0 ppid=50 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.261000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.337677 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.337728 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.338571 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.340202 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.340237 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.341231 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.342152 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.342951 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.343746 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.344544 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.345533 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.347165 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.347207 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.348084 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.348935 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.349778 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.350624 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.352188 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.352221 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.353028 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.353859 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.354699 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.356258 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.356293 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.357116 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.357960 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.358797 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.359616 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.361248 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.361282 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.362111 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.362871 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.363666 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.364525 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.366059 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.366106 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.366953 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.367804 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.368629 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.370270 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.370305 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.371127 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.371960 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.372758 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.373597 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.375177 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.375209 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.376005 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.376884 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.377842 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.378691 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.379543 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.381198 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.381231 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.382075 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.382912 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.383770 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.384582 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.386210 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.386257 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.395492 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.397022 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.397055 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.397834 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.398681 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.399527 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.401154 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.401182 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.402008 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.402866 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.403703 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.404527 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.406199 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.406235 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.407082 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.407923 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.408771 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.409623 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.411251 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.411284 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.412105 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.412944 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.413784 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.414633 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.415520 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.417111 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.417144 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.417994 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.418836 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.419665 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.420518 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.422130 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.422164 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.423091 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.423940 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.424785 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.425635 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.426532 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.428118 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.428155 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.428978 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.429810 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.430651 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.431528 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.433107 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.433140 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.433961 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.434802 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.435678 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.436565 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.438213 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.438247 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.439075 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.439914 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.440764 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.441624 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.443253 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.443304 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.444066 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.445003 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.445950 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.446815 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.447767 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.448736 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.449599 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.323000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.450543 kernel: Failed to create system directory sunrpc Dec 13 15:59:37.461359 kernel: RPC: Registered named UNIX socket transport module. Dec 13 15:59:37.461569 kernel: RPC: Registered udp transport module. Dec 13 15:59:37.461641 kernel: RPC: Registered tcp transport module. Dec 13 15:59:37.461881 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 15:59:37.323000 audit[3110]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5619abb8cad0 a1=1a7f1c a2=56199a3712b0 a3=5 items=6 ppid=50 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.323000 audit: CWD cwd="/" Dec 13 15:59:37.323000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:59:37.323000 audit: PATH item=1 name=(null) inode=25414 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:59:37.323000 audit: PATH item=2 name=(null) inode=25414 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:59:37.323000 audit: PATH item=3 name=(null) inode=25415 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:59:37.323000 audit: PATH item=4 name=(null) inode=25414 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:59:37.323000 audit: PATH item=5 name=(null) inode=25416 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:59:37.323000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.508687 kernel: Failed to create system directory nfs Dec 13 15:59:37.508841 kernel: Failed to create system directory nfs Dec 13 15:59:37.508905 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.510058 kernel: Failed to create system directory nfs Dec 13 15:59:37.510161 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.510774 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.512208 kernel: Failed to create system directory nfs Dec 13 15:59:37.512305 kernel: Failed to create system directory nfs Dec 13 15:59:37.513164 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.513660 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.515102 kernel: Failed to create system directory nfs Dec 13 15:59:37.515169 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.515846 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.516566 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.517995 kernel: Failed to create system directory nfs Dec 13 15:59:37.518076 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.518726 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.520163 kernel: Failed to create system directory nfs Dec 13 15:59:37.520279 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.520890 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.521617 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.523042 kernel: Failed to create system directory nfs Dec 13 15:59:37.523127 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.523761 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.525190 kernel: Failed to create system directory nfs Dec 13 15:59:37.525259 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.525909 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.526633 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.528064 kernel: Failed to create system directory nfs Dec 13 15:59:37.528110 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.528787 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.530368 kernel: Failed to create system directory nfs Dec 13 15:59:37.530468 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.530954 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.531680 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.533181 kernel: Failed to create system directory nfs Dec 13 15:59:37.533363 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.533868 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.534597 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.536035 kernel: Failed to create system directory nfs Dec 13 15:59:37.536142 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.536754 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.538218 kernel: Failed to create system directory nfs Dec 13 15:59:37.538367 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.538915 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.539648 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.541120 kernel: Failed to create system directory nfs Dec 13 15:59:37.541209 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.541815 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.543276 kernel: Failed to create system directory nfs Dec 13 15:59:37.543348 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.543966 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.544748 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.546191 kernel: Failed to create system directory nfs Dec 13 15:59:37.546392 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.546920 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.548371 kernel: Failed to create system directory nfs Dec 13 15:59:37.548486 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.549128 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.549825 kernel: Failed to create system directory nfs Dec 13 15:59:37.497000 audit[3110]: AVC avc: denied { confidentiality } for pid=3110 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.577356 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 15:59:37.497000 audit[3110]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5619abdad700 a1=16e97c a2=56199a3712b0 a3=5 items=0 ppid=50 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.497000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.641699 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.641873 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.641933 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.641978 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.642022 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.642099 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.642151 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.642199 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.642291 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.642340 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.642390 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.642439 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.642484 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.642551 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.642602 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.644809 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.644873 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.644897 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.645195 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.646935 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.646983 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.648179 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.648235 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.649748 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.649794 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.651208 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.651298 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.651889 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.652664 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.654124 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.654166 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.654805 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.655583 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.657032 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.657068 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.659234 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.659269 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.659292 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.659923 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.660699 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.662154 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.662181 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.662852 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.663628 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.665100 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.665141 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.665822 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.667295 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.667330 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.667982 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.677162 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.677815 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.678596 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.680041 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.680077 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.680737 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.682255 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.682292 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.682934 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.683708 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.685188 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.685251 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.686669 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.686699 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.688141 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.688176 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.689617 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.689648 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.691090 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.691122 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.692581 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.692620 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.694033 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.694067 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.696241 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.696273 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.696328 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.697857 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.697892 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.700321 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.700501 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.700917 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.701076 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.701733 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.703156 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.703344 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.703867 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.705298 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.705406 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.705974 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.706738 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.708244 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.708315 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.616000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.709708 kernel: Failed to create system directory nfs4 Dec 13 15:59:37.788568 kubelet[1515]: E1213 15:59:37.788343 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:37.874815 kernel: NFS: Registering the id_resolver key type Dec 13 15:59:37.874989 kernel: Key type id_resolver registered Dec 13 15:59:37.875042 kernel: Key type id_legacy registered Dec 13 15:59:37.616000 audit[3115]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f469da58010 a1=208de4 a2=5653f17d72b0 a3=5 items=0 ppid=50 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.616000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.902898 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.902971 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.903873 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.904751 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.905574 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.907271 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.907311 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.908159 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.909080 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.909964 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.910836 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.911705 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.912781 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.912924 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.914344 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.914422 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.915049 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.915771 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.916582 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.918078 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.918224 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.919883 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.919976 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.921301 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.921434 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.922077 kernel: Failed to create system directory rpcgss Dec 13 15:59:37.896000 audit[3117]: AVC avc: denied { confidentiality } for pid=3117 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:59:37.896000 audit[3117]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb511214010 a1=70af4 a2=56212bc442b0 a3=5 items=0 ppid=50 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.896000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 15:59:37.964872 nfsidmap[3123]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Dec 13 15:59:37.973842 nfsidmap[3126]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Dec 13 15:59:37.985000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:59:37.985000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:59:37.985000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:59:37.985000 audit[1268]: AVC avc: denied { watch_reads } for pid=1268 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:59:37.985000 audit[1268]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55af81b6b9d0 a2=10 a3=8629cddfa74c0d14 items=0 ppid=1 pid=1268 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.985000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 15:59:37.985000 audit[1268]: AVC avc: denied { watch_reads } for pid=1268 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:59:37.985000 audit[1268]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55af81b6b9d0 a2=10 a3=8629cddfa74c0d14 items=0 ppid=1 pid=1268 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.985000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 15:59:37.985000 audit[1268]: AVC avc: denied { watch_reads } for pid=1268 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:59:37.985000 audit[1268]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55af81b6b9d0 a2=10 a3=8629cddfa74c0d14 items=0 ppid=1 pid=1268 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.985000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 15:59:38.170534 env[1199]: time="2024-12-13T15:59:38.169246527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fab02d4c-17d0-4c89-a3c3-133d80d6e313,Namespace:default,Attempt:0,}" Dec 13 15:59:38.355813 systemd-networkd[1019]: cali5ec59c6bf6e: Link UP Dec 13 15:59:38.360428 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:59:38.360601 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 15:59:38.360909 systemd-networkd[1019]: cali5ec59c6bf6e: Gained carrier Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.231 [INFO][3130] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.97.146-k8s-test--pod--1-eth0 default fab02d4c-17d0-4c89-a3c3-133d80d6e313 1353 0 2024-12-13 15:59:22 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.244.97.146 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.146-k8s-test--pod--1-" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.232 [INFO][3130] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.146-k8s-test--pod--1-eth0" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.270 [INFO][3141] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" HandleID="k8s-pod-network.ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" Workload="10.244.97.146-k8s-test--pod--1-eth0" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.285 [INFO][3141] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" HandleID="k8s-pod-network.ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" Workload="10.244.97.146-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b6c0), Attrs:map[string]string{"namespace":"default", "node":"10.244.97.146", "pod":"test-pod-1", "timestamp":"2024-12-13 15:59:38.2700147 +0000 UTC"}, Hostname:"10.244.97.146", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.285 [INFO][3141] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.285 [INFO][3141] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.285 [INFO][3141] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.97.146' Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.287 [INFO][3141] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" host="10.244.97.146" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.293 [INFO][3141] ipam/ipam.go 372: Looking up existing affinities for host host="10.244.97.146" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.301 [INFO][3141] ipam/ipam.go 489: Trying affinity for 192.168.122.192/26 host="10.244.97.146" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.304 [INFO][3141] ipam/ipam.go 155: Attempting to load block cidr=192.168.122.192/26 host="10.244.97.146" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.313 [INFO][3141] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.122.192/26 host="10.244.97.146" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.314 [INFO][3141] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.122.192/26 handle="k8s-pod-network.ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" host="10.244.97.146" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.319 [INFO][3141] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927 Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.331 [INFO][3141] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.122.192/26 handle="k8s-pod-network.ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" host="10.244.97.146" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.340 [INFO][3141] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.122.196/26] block=192.168.122.192/26 handle="k8s-pod-network.ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" host="10.244.97.146" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.340 [INFO][3141] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.122.196/26] handle="k8s-pod-network.ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" host="10.244.97.146" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.341 [INFO][3141] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.341 [INFO][3141] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.196/26] IPv6=[] ContainerID="ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" HandleID="k8s-pod-network.ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" Workload="10.244.97.146-k8s-test--pod--1-eth0" Dec 13 15:59:38.377496 env[1199]: 2024-12-13 15:59:38.344 [INFO][3130] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.146-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fab02d4c-17d0-4c89-a3c3-133d80d6e313", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 59, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:59:38.378479 env[1199]: 2024-12-13 15:59:38.344 [INFO][3130] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.122.196/32] ContainerID="ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.146-k8s-test--pod--1-eth0" Dec 13 15:59:38.378479 env[1199]: 2024-12-13 15:59:38.344 [INFO][3130] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.146-k8s-test--pod--1-eth0" Dec 13 15:59:38.378479 env[1199]: 2024-12-13 15:59:38.363 [INFO][3130] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.146-k8s-test--pod--1-eth0" Dec 13 15:59:38.378479 env[1199]: 2024-12-13 15:59:38.363 [INFO][3130] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.146-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.146-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fab02d4c-17d0-4c89-a3c3-133d80d6e313", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 59, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.146", ContainerID:"ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ee:65:44:d3:19:ae", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:59:38.378479 env[1199]: 2024-12-13 15:59:38.374 [INFO][3130] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.146-k8s-test--pod--1-eth0" Dec 13 15:59:38.398615 env[1199]: time="2024-12-13T15:59:38.397797572Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:59:38.398615 env[1199]: time="2024-12-13T15:59:38.397857852Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:59:38.398615 env[1199]: time="2024-12-13T15:59:38.397869833Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:59:38.402843 env[1199]: time="2024-12-13T15:59:38.402808369Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927 pid=3166 runtime=io.containerd.runc.v2 Dec 13 15:59:38.411000 audit[3180]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_chain pid=3180 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:59:38.411000 audit[3180]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7ffe255da370 a2=0 a3=7ffe255da35c items=0 ppid=2198 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:38.411000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:59:38.426039 systemd[1]: Started cri-containerd-ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927.scope. Dec 13 15:59:38.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.454000 audit: BPF prog-id=126 op=LOAD Dec 13 15:59:38.454000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.454000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3166 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:38.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626433323134633231306461316136643765636666343062333033 Dec 13 15:59:38.455000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.455000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3166 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:38.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626433323134633231306461316136643765636666343062333033 Dec 13 15:59:38.455000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.455000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.455000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.455000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.455000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.455000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.455000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.455000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.455000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.455000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.455000 audit: BPF prog-id=127 op=LOAD Dec 13 15:59:38.455000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001d0e30 items=0 ppid=3166 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:38.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626433323134633231306461316136643765636666343062333033 Dec 13 15:59:38.456000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.456000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.456000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.456000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.456000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.456000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.456000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.456000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.456000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.456000 audit: BPF prog-id=128 op=LOAD Dec 13 15:59:38.456000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001d0e78 items=0 ppid=3166 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:38.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626433323134633231306461316136643765636666343062333033 Dec 13 15:59:38.456000 audit: BPF prog-id=128 op=UNLOAD Dec 13 15:59:38.457000 audit: BPF prog-id=127 op=UNLOAD Dec 13 15:59:38.457000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.457000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.457000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.457000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.457000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.457000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.457000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.457000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.457000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.457000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.457000 audit: BPF prog-id=129 op=LOAD Dec 13 15:59:38.457000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001d1288 items=0 ppid=3166 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:38.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626433323134633231306461316136643765636666343062333033 Dec 13 15:59:38.491590 env[1199]: time="2024-12-13T15:59:38.491547698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fab02d4c-17d0-4c89-a3c3-133d80d6e313,Namespace:default,Attempt:0,} returns sandbox id \"ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927\"" Dec 13 15:59:38.493449 env[1199]: time="2024-12-13T15:59:38.493375983Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 15:59:38.789042 kubelet[1515]: E1213 15:59:38.788795 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:38.856488 env[1199]: time="2024-12-13T15:59:38.856405136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:38.858265 env[1199]: time="2024-12-13T15:59:38.858234005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:38.860659 env[1199]: time="2024-12-13T15:59:38.860632308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:38.863371 env[1199]: time="2024-12-13T15:59:38.863348369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:59:38.865361 env[1199]: time="2024-12-13T15:59:38.865304077Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 15:59:38.869174 env[1199]: time="2024-12-13T15:59:38.869147602Z" level=info msg="CreateContainer within sandbox \"ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 15:59:38.877903 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1829831653.mount: Deactivated successfully. Dec 13 15:59:38.894101 env[1199]: time="2024-12-13T15:59:38.894015531Z" level=info msg="CreateContainer within sandbox \"ffbd3214c210da1a6d7ecff40b30354ff98fb5c7538769b726d066a231d55927\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"45951dac8ef6816cbd6fff07d64a9e7105d1c6400b01342e517aa2108f7098f4\"" Dec 13 15:59:38.895399 env[1199]: time="2024-12-13T15:59:38.895346624Z" level=info msg="StartContainer for \"45951dac8ef6816cbd6fff07d64a9e7105d1c6400b01342e517aa2108f7098f4\"" Dec 13 15:59:38.915365 systemd[1]: Started cri-containerd-45951dac8ef6816cbd6fff07d64a9e7105d1c6400b01342e517aa2108f7098f4.scope. Dec 13 15:59:38.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.930000 audit: BPF prog-id=130 op=LOAD Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3166 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:38.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393531646163386566363831366362643666666630376436346139 Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3166 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:38.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393531646163386566363831366362643666666630376436346139 Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.931000 audit: BPF prog-id=131 op=LOAD Dec 13 15:59:38.931000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023b5f0 items=0 ppid=3166 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:38.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393531646163386566363831366362643666666630376436346139 Dec 13 15:59:38.932000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.932000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.932000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.932000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.932000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.932000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.932000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.932000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.932000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.932000 audit: BPF prog-id=132 op=LOAD Dec 13 15:59:38.932000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023b638 items=0 ppid=3166 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:38.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393531646163386566363831366362643666666630376436346139 Dec 13 15:59:38.933000 audit: BPF prog-id=132 op=UNLOAD Dec 13 15:59:38.933000 audit: BPF prog-id=131 op=UNLOAD Dec 13 15:59:38.933000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.933000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.933000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.933000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.933000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.933000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.933000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.933000 audit[3210]: AVC avc: denied { perfmon } for pid=3210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.933000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.933000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:59:38.933000 audit: BPF prog-id=133 op=LOAD Dec 13 15:59:38.933000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023ba48 items=0 ppid=3166 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:38.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393531646163386566363831366362643666666630376436346139 Dec 13 15:59:38.954115 env[1199]: time="2024-12-13T15:59:38.954070751Z" level=info msg="StartContainer for \"45951dac8ef6816cbd6fff07d64a9e7105d1c6400b01342e517aa2108f7098f4\" returns successfully" Dec 13 15:59:39.155155 kubelet[1515]: I1213 15:59:39.154920 1515 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.781718697 podStartE2EDuration="17.154830475s" podCreationTimestamp="2024-12-13 15:59:22 +0000 UTC" firstStartedPulling="2024-12-13 15:59:38.492745292 +0000 UTC m=+67.330920509" lastFinishedPulling="2024-12-13 15:59:38.865857008 +0000 UTC m=+67.704032287" observedRunningTime="2024-12-13 15:59:39.152608533 +0000 UTC m=+67.990783868" watchObservedRunningTime="2024-12-13 15:59:39.154830475 +0000 UTC m=+67.993005776" Dec 13 15:59:39.421427 systemd-networkd[1019]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 15:59:39.600036 systemd[1]: run-containerd-runc-k8s.io-2f57999e23eb6cf26873bb687114d4c307781383015b044207a8834a482dff77-runc.hrO0Lo.mount: Deactivated successfully. Dec 13 15:59:39.789711 kubelet[1515]: E1213 15:59:39.789610 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:40.791211 kubelet[1515]: E1213 15:59:40.791009 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:41.791702 kubelet[1515]: E1213 15:59:41.791610 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:42.792452 kubelet[1515]: E1213 15:59:42.792348 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:43.792951 kubelet[1515]: E1213 15:59:43.792908 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:44.794240 kubelet[1515]: E1213 15:59:44.794095 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:45.795115 kubelet[1515]: E1213 15:59:45.795047 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:46.796966 kubelet[1515]: E1213 15:59:46.796870 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:47.798194 kubelet[1515]: E1213 15:59:47.797942 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:59:48.799305 kubelet[1515]: E1213 15:59:48.799176 1515 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"