Dec 13 15:22:14.881608 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 15:22:14.881632 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:22:14.881647 kernel: BIOS-provided physical RAM map: Dec 13 15:22:14.881654 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 15:22:14.881661 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 15:22:14.881668 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 15:22:14.881676 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Dec 13 15:22:14.881684 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Dec 13 15:22:14.881691 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 15:22:14.881697 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 15:22:14.881708 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 15:22:14.881715 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 15:22:14.881721 kernel: NX (Execute Disable) protection: active Dec 13 15:22:14.881729 kernel: SMBIOS 2.8 present. Dec 13 15:22:14.881738 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Dec 13 15:22:14.881746 kernel: Hypervisor detected: KVM Dec 13 15:22:14.881757 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 15:22:14.881765 kernel: kvm-clock: cpu 0, msr 4e19a001, primary cpu clock Dec 13 15:22:14.881772 kernel: kvm-clock: using sched offset of 4204050613 cycles Dec 13 15:22:14.881781 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 15:22:14.881789 kernel: tsc: Detected 2294.576 MHz processor Dec 13 15:22:14.881797 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 15:22:14.881806 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 15:22:14.881813 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Dec 13 15:22:14.881821 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 15:22:14.881832 kernel: Using GB pages for direct mapping Dec 13 15:22:14.881841 kernel: ACPI: Early table checksum verification disabled Dec 13 15:22:14.881854 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 13 15:22:14.881862 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:22:14.881870 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:22:14.881878 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:22:14.881886 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Dec 13 15:22:14.881894 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:22:14.881902 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:22:14.881912 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:22:14.881920 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:22:14.881928 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Dec 13 15:22:14.881936 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Dec 13 15:22:14.881944 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Dec 13 15:22:14.881952 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Dec 13 15:22:14.881965 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Dec 13 15:22:14.881976 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Dec 13 15:22:14.881985 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Dec 13 15:22:14.881993 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 15:22:14.882002 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 15:22:14.882010 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 15:22:14.882018 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Dec 13 15:22:14.882027 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 15:22:14.882038 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Dec 13 15:22:14.882046 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 15:22:14.882055 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Dec 13 15:22:14.882063 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 15:22:14.882071 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Dec 13 15:22:14.882080 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 15:22:14.882088 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Dec 13 15:22:14.882096 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 15:22:14.882105 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Dec 13 15:22:14.882113 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 15:22:14.882125 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Dec 13 15:22:14.882133 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 15:22:14.882141 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 15:22:14.882150 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Dec 13 15:22:14.882159 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Dec 13 15:22:14.882167 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Dec 13 15:22:14.882176 kernel: Zone ranges: Dec 13 15:22:14.882184 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 15:22:14.882193 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Dec 13 15:22:14.882204 kernel: Normal empty Dec 13 15:22:14.882213 kernel: Movable zone start for each node Dec 13 15:22:14.882221 kernel: Early memory node ranges Dec 13 15:22:14.882230 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 15:22:14.882238 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Dec 13 15:22:14.882247 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Dec 13 15:22:14.882255 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 15:22:14.882264 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 15:22:14.882272 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Dec 13 15:22:14.882284 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 15:22:14.882292 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 15:22:14.882301 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 15:22:14.882310 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 15:22:14.882318 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 15:22:14.882327 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 15:22:14.882336 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 15:22:14.882344 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 15:22:14.882353 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 15:22:14.882365 kernel: TSC deadline timer available Dec 13 15:22:14.882373 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Dec 13 15:22:14.882382 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 15:22:14.882391 kernel: Booting paravirtualized kernel on KVM Dec 13 15:22:14.882399 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 15:22:14.882408 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 15:22:14.882417 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 15:22:14.889454 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 15:22:14.889469 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 15:22:14.889485 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Dec 13 15:22:14.889494 kernel: kvm-guest: PV spinlocks enabled Dec 13 15:22:14.889503 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 15:22:14.889513 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Dec 13 15:22:14.889522 kernel: Policy zone: DMA32 Dec 13 15:22:14.889532 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:22:14.889542 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 15:22:14.889551 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 15:22:14.889563 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 15:22:14.889572 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 15:22:14.889581 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 192524K reserved, 0K cma-reserved) Dec 13 15:22:14.889590 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 15:22:14.889599 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 15:22:14.889608 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 15:22:14.889616 kernel: rcu: Hierarchical RCU implementation. Dec 13 15:22:14.889626 kernel: rcu: RCU event tracing is enabled. Dec 13 15:22:14.889636 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 15:22:14.889647 kernel: Rude variant of Tasks RCU enabled. Dec 13 15:22:14.889657 kernel: Tracing variant of Tasks RCU enabled. Dec 13 15:22:14.889666 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 15:22:14.889675 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 15:22:14.889683 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Dec 13 15:22:14.889692 kernel: random: crng init done Dec 13 15:22:14.889701 kernel: Console: colour VGA+ 80x25 Dec 13 15:22:14.889723 kernel: printk: console [tty0] enabled Dec 13 15:22:14.889733 kernel: printk: console [ttyS0] enabled Dec 13 15:22:14.889742 kernel: ACPI: Core revision 20210730 Dec 13 15:22:14.889751 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 15:22:14.889761 kernel: x2apic enabled Dec 13 15:22:14.889773 kernel: Switched APIC routing to physical x2apic. Dec 13 15:22:14.889782 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2113312ac93, max_idle_ns: 440795244843 ns Dec 13 15:22:14.889792 kernel: Calibrating delay loop (skipped) preset value.. 4589.15 BogoMIPS (lpj=2294576) Dec 13 15:22:14.889801 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 15:22:14.889811 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 15:22:14.889824 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 15:22:14.889833 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 15:22:14.889850 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 15:22:14.889860 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 15:22:14.889869 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 15:22:14.889878 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 15:22:14.889887 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 15:22:14.889896 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 15:22:14.889905 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 15:22:14.889914 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 15:22:14.889926 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 15:22:14.889936 kernel: TAA: Mitigation: Clear CPU buffers Dec 13 15:22:14.889945 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 15:22:14.889954 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 15:22:14.889963 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 15:22:14.889972 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 15:22:14.889981 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 15:22:14.889990 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 15:22:14.890000 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 15:22:14.890009 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 15:22:14.890018 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Dec 13 15:22:14.890030 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 15:22:14.890039 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 15:22:14.890048 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 15:22:14.890058 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 15:22:14.890066 kernel: x86/fpu: xstate_offset[9]: 2432, xstate_sizes[9]: 8 Dec 13 15:22:14.890076 kernel: x86/fpu: Enabled xstate features 0x2e7, context size is 2440 bytes, using 'compacted' format. Dec 13 15:22:14.890085 kernel: Freeing SMP alternatives memory: 32K Dec 13 15:22:14.890094 kernel: pid_max: default: 32768 minimum: 301 Dec 13 15:22:14.890103 kernel: LSM: Security Framework initializing Dec 13 15:22:14.890112 kernel: SELinux: Initializing. Dec 13 15:22:14.890121 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 15:22:14.890131 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 15:22:14.890142 kernel: smpboot: CPU0: Intel Xeon Processor (Cascadelake) (family: 0x6, model: 0x55, stepping: 0x6) Dec 13 15:22:14.890152 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 15:22:14.890161 kernel: signal: max sigframe size: 3632 Dec 13 15:22:14.890170 kernel: rcu: Hierarchical SRCU implementation. Dec 13 15:22:14.890180 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 15:22:14.890189 kernel: smp: Bringing up secondary CPUs ... Dec 13 15:22:14.890198 kernel: x86: Booting SMP configuration: Dec 13 15:22:14.890208 kernel: .... node #0, CPUs: #1 Dec 13 15:22:14.890217 kernel: kvm-clock: cpu 1, msr 4e19a041, secondary cpu clock Dec 13 15:22:14.890229 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 15:22:14.890239 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Dec 13 15:22:14.890248 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 15:22:14.890257 kernel: smpboot: Max logical packages: 16 Dec 13 15:22:14.890266 kernel: smpboot: Total of 2 processors activated (9178.30 BogoMIPS) Dec 13 15:22:14.890275 kernel: devtmpfs: initialized Dec 13 15:22:14.890285 kernel: x86/mm: Memory block size: 128MB Dec 13 15:22:14.890294 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 15:22:14.890303 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 15:22:14.890315 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 15:22:14.890324 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 15:22:14.890333 kernel: audit: initializing netlink subsys (disabled) Dec 13 15:22:14.890343 kernel: audit: type=2000 audit(1734103334.560:1): state=initialized audit_enabled=0 res=1 Dec 13 15:22:14.890352 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 15:22:14.890361 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 15:22:14.890370 kernel: cpuidle: using governor menu Dec 13 15:22:14.890379 kernel: ACPI: bus type PCI registered Dec 13 15:22:14.890389 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 15:22:14.890398 kernel: dca service started, version 1.12.1 Dec 13 15:22:14.890411 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 15:22:14.890420 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 15:22:14.890437 kernel: PCI: Using configuration type 1 for base access Dec 13 15:22:14.890446 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 15:22:14.890456 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 15:22:14.890465 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 15:22:14.890475 kernel: ACPI: Added _OSI(Module Device) Dec 13 15:22:14.890484 kernel: ACPI: Added _OSI(Processor Device) Dec 13 15:22:14.890497 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 15:22:14.890506 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 15:22:14.890516 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 15:22:14.890525 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 15:22:14.890534 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 15:22:14.890543 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 15:22:14.890553 kernel: ACPI: Interpreter enabled Dec 13 15:22:14.890562 kernel: ACPI: PM: (supports S0 S5) Dec 13 15:22:14.890571 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 15:22:14.890581 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 15:22:14.890593 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 15:22:14.890602 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 15:22:14.890772 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 15:22:14.890871 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 15:22:14.890954 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 15:22:14.890966 kernel: PCI host bridge to bus 0000:00 Dec 13 15:22:14.891056 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 15:22:14.891136 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 15:22:14.891210 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 15:22:14.891285 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Dec 13 15:22:14.891359 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 15:22:14.891444 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Dec 13 15:22:14.891520 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 15:22:14.891623 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 15:22:14.891717 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Dec 13 15:22:14.891804 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Dec 13 15:22:14.891899 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Dec 13 15:22:14.891982 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Dec 13 15:22:14.892070 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 15:22:14.892170 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Dec 13 15:22:14.892265 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Dec 13 15:22:14.892370 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Dec 13 15:22:14.892464 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Dec 13 15:22:14.892568 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Dec 13 15:22:14.892657 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Dec 13 15:22:14.892747 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Dec 13 15:22:14.892839 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Dec 13 15:22:14.892941 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Dec 13 15:22:14.893030 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Dec 13 15:22:14.893119 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Dec 13 15:22:14.893208 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Dec 13 15:22:14.893299 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Dec 13 15:22:14.893391 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Dec 13 15:22:14.893492 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Dec 13 15:22:14.893578 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Dec 13 15:22:14.893673 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 15:22:14.893757 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 15:22:14.893840 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Dec 13 15:22:14.893934 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Dec 13 15:22:14.894022 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Dec 13 15:22:14.894113 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 15:22:14.894197 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 15:22:14.894281 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Dec 13 15:22:14.894371 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Dec 13 15:22:14.899561 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 15:22:14.899673 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 15:22:14.899776 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 15:22:14.899871 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Dec 13 15:22:14.899956 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Dec 13 15:22:14.900047 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 15:22:14.900130 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 15:22:14.900226 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Dec 13 15:22:14.900319 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Dec 13 15:22:14.900404 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 15:22:14.900496 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 15:22:14.900579 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:22:14.900674 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 15:22:14.900777 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Dec 13 15:22:14.900882 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Dec 13 15:22:14.900970 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 15:22:14.901058 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 15:22:14.901154 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Dec 13 15:22:14.901241 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Dec 13 15:22:14.901327 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 15:22:14.901410 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 15:22:14.901506 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:22:14.901605 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Dec 13 15:22:14.901694 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Dec 13 15:22:14.901779 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 15:22:14.901868 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 15:22:14.901953 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:22:14.902041 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 15:22:14.902123 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 15:22:14.902210 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:22:14.902294 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 15:22:14.902378 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 15:22:14.905554 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:22:14.905657 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 15:22:14.905744 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 15:22:14.905827 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:22:14.905921 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 15:22:14.906010 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 15:22:14.906093 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:22:14.906176 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 15:22:14.906259 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 15:22:14.906340 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:22:14.906352 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 15:22:14.906362 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 15:22:14.906372 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 15:22:14.906385 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 15:22:14.906395 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 15:22:14.906404 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 15:22:14.906413 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 15:22:14.908442 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 15:22:14.908470 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 15:22:14.908481 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 15:22:14.908491 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 15:22:14.908500 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 15:22:14.908514 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 15:22:14.908524 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 15:22:14.908533 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 15:22:14.908543 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 15:22:14.908553 kernel: iommu: Default domain type: Translated Dec 13 15:22:14.908562 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 15:22:14.908677 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 15:22:14.908767 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 15:22:14.908870 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 15:22:14.908883 kernel: vgaarb: loaded Dec 13 15:22:14.908893 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 15:22:14.908903 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 15:22:14.908912 kernel: PTP clock support registered Dec 13 15:22:14.908922 kernel: PCI: Using ACPI for IRQ routing Dec 13 15:22:14.908932 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 15:22:14.908942 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 15:22:14.908952 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Dec 13 15:22:14.908965 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 15:22:14.908974 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 15:22:14.908984 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 15:22:14.908993 kernel: pnp: PnP ACPI init Dec 13 15:22:14.909088 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 15:22:14.909102 kernel: pnp: PnP ACPI: found 5 devices Dec 13 15:22:14.909112 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 15:22:14.909121 kernel: NET: Registered PF_INET protocol family Dec 13 15:22:14.909134 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 15:22:14.909144 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 15:22:14.909153 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 15:22:14.909163 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 15:22:14.909172 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 15:22:14.909182 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 15:22:14.909191 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 15:22:14.909201 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 15:22:14.909211 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 15:22:14.909223 kernel: NET: Registered PF_XDP protocol family Dec 13 15:22:14.909310 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Dec 13 15:22:14.909398 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Dec 13 15:22:14.909519 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Dec 13 15:22:14.909606 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Dec 13 15:22:14.909690 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 15:22:14.909779 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 15:22:14.909871 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 15:22:14.909955 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 15:22:14.910037 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Dec 13 15:22:14.910120 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Dec 13 15:22:14.910202 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Dec 13 15:22:14.910284 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Dec 13 15:22:14.910387 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Dec 13 15:22:14.914518 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Dec 13 15:22:14.914621 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Dec 13 15:22:14.914711 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Dec 13 15:22:14.914804 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 15:22:14.914903 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 15:22:14.914989 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 15:22:14.915073 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Dec 13 15:22:14.915162 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 15:22:14.915247 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:22:14.915331 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 15:22:14.915416 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Dec 13 15:22:14.915514 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 15:22:14.915597 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:22:14.915687 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 15:22:14.915769 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Dec 13 15:22:14.915860 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 15:22:14.915944 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:22:14.916030 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 15:22:14.916112 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Dec 13 15:22:14.916197 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 15:22:14.916285 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:22:14.916373 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 15:22:14.916467 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Dec 13 15:22:14.916553 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 15:22:14.916641 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:22:14.916725 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 15:22:14.916813 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Dec 13 15:22:14.916905 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 15:22:14.916989 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:22:14.917074 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 15:22:14.917162 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Dec 13 15:22:14.917245 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 15:22:14.917334 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:22:14.917419 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 15:22:14.917521 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Dec 13 15:22:14.917606 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 15:22:14.917695 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:22:14.917784 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 15:22:14.917872 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 15:22:14.917948 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 15:22:14.918023 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Dec 13 15:22:14.918106 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 15:22:14.918182 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Dec 13 15:22:14.918280 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Dec 13 15:22:14.918364 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Dec 13 15:22:14.919488 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:22:14.919590 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Dec 13 15:22:14.919683 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Dec 13 15:22:14.919765 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Dec 13 15:22:14.919850 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:22:14.919941 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Dec 13 15:22:14.920026 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Dec 13 15:22:14.920104 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:22:14.920198 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Dec 13 15:22:14.920269 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Dec 13 15:22:14.920341 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:22:14.920423 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Dec 13 15:22:14.921550 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Dec 13 15:22:14.921636 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:22:14.921725 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Dec 13 15:22:14.921805 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Dec 13 15:22:14.921891 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:22:14.921977 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Dec 13 15:22:14.922057 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Dec 13 15:22:14.922140 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:22:14.922226 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Dec 13 15:22:14.922306 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Dec 13 15:22:14.922384 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:22:14.922398 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 15:22:14.922409 kernel: PCI: CLS 0 bytes, default 64 Dec 13 15:22:14.922419 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 15:22:14.923455 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Dec 13 15:22:14.923473 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 15:22:14.923484 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2113312ac93, max_idle_ns: 440795244843 ns Dec 13 15:22:14.923495 kernel: Initialise system trusted keyrings Dec 13 15:22:14.923505 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 15:22:14.923516 kernel: Key type asymmetric registered Dec 13 15:22:14.923526 kernel: Asymmetric key parser 'x509' registered Dec 13 15:22:14.923536 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 15:22:14.923546 kernel: io scheduler mq-deadline registered Dec 13 15:22:14.923556 kernel: io scheduler kyber registered Dec 13 15:22:14.923570 kernel: io scheduler bfq registered Dec 13 15:22:14.923680 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Dec 13 15:22:14.923769 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Dec 13 15:22:14.923866 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:22:14.923953 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Dec 13 15:22:14.924037 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Dec 13 15:22:14.924120 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:22:14.924210 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Dec 13 15:22:14.924295 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Dec 13 15:22:14.924379 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:22:14.926271 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Dec 13 15:22:14.926374 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Dec 13 15:22:14.926473 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:22:14.926569 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Dec 13 15:22:14.926654 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Dec 13 15:22:14.926739 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:22:14.926825 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Dec 13 15:22:14.926926 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Dec 13 15:22:14.927011 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:22:14.927103 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Dec 13 15:22:14.927187 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Dec 13 15:22:14.927271 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:22:14.927355 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Dec 13 15:22:14.927445 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Dec 13 15:22:14.927534 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:22:14.927551 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 15:22:14.927562 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 15:22:14.927573 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 15:22:14.927583 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 15:22:14.927594 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 15:22:14.927604 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 15:22:14.927615 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 15:22:14.927625 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 15:22:14.927638 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 15:22:14.927733 kernel: rtc_cmos 00:03: RTC can wake from S4 Dec 13 15:22:14.927815 kernel: rtc_cmos 00:03: registered as rtc0 Dec 13 15:22:14.927902 kernel: rtc_cmos 00:03: setting system clock to 2024-12-13T15:22:14 UTC (1734103334) Dec 13 15:22:14.927979 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Dec 13 15:22:14.927992 kernel: intel_pstate: CPU model not supported Dec 13 15:22:14.928002 kernel: NET: Registered PF_INET6 protocol family Dec 13 15:22:14.928016 kernel: Segment Routing with IPv6 Dec 13 15:22:14.928026 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 15:22:14.928036 kernel: NET: Registered PF_PACKET protocol family Dec 13 15:22:14.928047 kernel: Key type dns_resolver registered Dec 13 15:22:14.928056 kernel: IPI shorthand broadcast: enabled Dec 13 15:22:14.928067 kernel: sched_clock: Marking stable (772515963, 119504150)->(1129340649, -237320536) Dec 13 15:22:14.928077 kernel: registered taskstats version 1 Dec 13 15:22:14.928087 kernel: Loading compiled-in X.509 certificates Dec 13 15:22:14.928098 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 15:22:14.928111 kernel: Key type .fscrypt registered Dec 13 15:22:14.928121 kernel: Key type fscrypt-provisioning registered Dec 13 15:22:14.928132 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 15:22:14.928142 kernel: ima: Allocated hash algorithm: sha1 Dec 13 15:22:14.928152 kernel: ima: No architecture policies found Dec 13 15:22:14.928162 kernel: clk: Disabling unused clocks Dec 13 15:22:14.928173 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 15:22:14.928183 kernel: Write protecting the kernel read-only data: 28672k Dec 13 15:22:14.928193 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 15:22:14.928206 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 15:22:14.928217 kernel: Run /init as init process Dec 13 15:22:14.928227 kernel: with arguments: Dec 13 15:22:14.928238 kernel: /init Dec 13 15:22:14.928247 kernel: with environment: Dec 13 15:22:14.928258 kernel: HOME=/ Dec 13 15:22:14.928268 kernel: TERM=linux Dec 13 15:22:14.928277 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 15:22:14.928290 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:22:14.928308 systemd[1]: Detected virtualization kvm. Dec 13 15:22:14.928319 systemd[1]: Detected architecture x86-64. Dec 13 15:22:14.928329 systemd[1]: Running in initrd. Dec 13 15:22:14.928339 systemd[1]: No hostname configured, using default hostname. Dec 13 15:22:14.928350 systemd[1]: Hostname set to . Dec 13 15:22:14.928361 systemd[1]: Initializing machine ID from VM UUID. Dec 13 15:22:14.928371 systemd[1]: Queued start job for default target initrd.target. Dec 13 15:22:14.928385 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:22:14.928395 systemd[1]: Reached target cryptsetup.target. Dec 13 15:22:14.928406 systemd[1]: Reached target paths.target. Dec 13 15:22:14.928416 systemd[1]: Reached target slices.target. Dec 13 15:22:14.928443 systemd[1]: Reached target swap.target. Dec 13 15:22:14.928453 systemd[1]: Reached target timers.target. Dec 13 15:22:14.928465 systemd[1]: Listening on iscsid.socket. Dec 13 15:22:14.928475 systemd[1]: Listening on iscsiuio.socket. Dec 13 15:22:14.928488 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 15:22:14.928503 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 15:22:14.928513 systemd[1]: Listening on systemd-journald.socket. Dec 13 15:22:14.928524 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:22:14.928535 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:22:14.928545 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:22:14.928557 systemd[1]: Reached target sockets.target. Dec 13 15:22:14.928568 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:22:14.928578 systemd[1]: Finished network-cleanup.service. Dec 13 15:22:14.928592 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 15:22:14.928603 systemd[1]: Starting systemd-journald.service... Dec 13 15:22:14.928614 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:22:14.928625 systemd[1]: Starting systemd-resolved.service... Dec 13 15:22:14.928635 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 15:22:14.928646 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:22:14.928656 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 15:22:14.928675 systemd-journald[201]: Journal started Dec 13 15:22:14.928738 systemd-journald[201]: Runtime Journal (/run/log/journal/5b83280f60294b0ebb5b573abf154262) is 4.7M, max 38.1M, 33.3M free. Dec 13 15:22:14.895028 systemd-modules-load[202]: Inserted module 'overlay' Dec 13 15:22:14.949920 systemd[1]: Started systemd-resolved.service. Dec 13 15:22:14.949967 systemd[1]: Started systemd-journald.service. Dec 13 15:22:14.949982 kernel: audit: type=1130 audit(1734103334.937:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.950000 kernel: audit: type=1130 audit(1734103334.938:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.950013 kernel: audit: type=1130 audit(1734103334.939:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.918615 systemd-resolved[203]: Positive Trust Anchors: Dec 13 15:22:14.959985 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 15:22:14.960014 kernel: Bridge firewalling registered Dec 13 15:22:14.918632 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:22:14.968318 kernel: audit: type=1130 audit(1734103334.959:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.968343 kernel: audit: type=1130 audit(1734103334.963:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.918670 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:22:14.925150 systemd-resolved[203]: Defaulting to hostname 'linux'. Dec 13 15:22:14.940304 systemd[1]: Reached target nss-lookup.target. Dec 13 15:22:14.950267 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:22:14.951107 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 15:22:14.961160 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:22:14.963180 systemd-modules-load[202]: Inserted module 'br_netfilter' Dec 13 15:22:14.965206 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 15:22:14.993521 kernel: SCSI subsystem initialized Dec 13 15:22:14.993609 kernel: audit: type=1130 audit(1734103334.990:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:14.990216 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 15:22:14.994591 systemd[1]: Starting dracut-cmdline.service... Dec 13 15:22:15.005124 dracut-cmdline[218]: dracut-dracut-053 Dec 13 15:22:15.008801 dracut-cmdline[218]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:22:15.024469 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 15:22:15.024498 kernel: device-mapper: uevent: version 1.0.3 Dec 13 15:22:15.025673 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 15:22:15.025153 systemd-modules-load[202]: Inserted module 'dm_multipath' Dec 13 15:22:15.025933 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:22:15.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:15.029396 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:22:15.033810 kernel: audit: type=1130 audit(1734103335.028:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:15.043050 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:22:15.047790 kernel: audit: type=1130 audit(1734103335.043:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:15.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:15.088456 kernel: Loading iSCSI transport class v2.0-870. Dec 13 15:22:15.108457 kernel: iscsi: registered transport (tcp) Dec 13 15:22:15.134480 kernel: iscsi: registered transport (qla4xxx) Dec 13 15:22:15.134568 kernel: QLogic iSCSI HBA Driver Dec 13 15:22:15.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:15.199059 systemd[1]: Finished dracut-cmdline.service. Dec 13 15:22:15.206012 kernel: audit: type=1130 audit(1734103335.199:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:15.202221 systemd[1]: Starting dracut-pre-udev.service... Dec 13 15:22:15.263530 kernel: raid6: avx512x4 gen() 27755 MB/s Dec 13 15:22:15.280497 kernel: raid6: avx512x4 xor() 5715 MB/s Dec 13 15:22:15.297518 kernel: raid6: avx512x2 gen() 28094 MB/s Dec 13 15:22:15.314511 kernel: raid6: avx512x2 xor() 20838 MB/s Dec 13 15:22:15.331505 kernel: raid6: avx512x1 gen() 27124 MB/s Dec 13 15:22:15.348485 kernel: raid6: avx512x1 xor() 19360 MB/s Dec 13 15:22:15.365527 kernel: raid6: avx2x4 gen() 18928 MB/s Dec 13 15:22:15.382499 kernel: raid6: avx2x4 xor() 5631 MB/s Dec 13 15:22:15.399509 kernel: raid6: avx2x2 gen() 20094 MB/s Dec 13 15:22:15.416530 kernel: raid6: avx2x2 xor() 15596 MB/s Dec 13 15:22:15.433499 kernel: raid6: avx2x1 gen() 17948 MB/s Dec 13 15:22:15.450551 kernel: raid6: avx2x1 xor() 13432 MB/s Dec 13 15:22:15.467514 kernel: raid6: sse2x4 gen() 7795 MB/s Dec 13 15:22:15.484499 kernel: raid6: sse2x4 xor() 4790 MB/s Dec 13 15:22:15.501515 kernel: raid6: sse2x2 gen() 8343 MB/s Dec 13 15:22:15.518501 kernel: raid6: sse2x2 xor() 5178 MB/s Dec 13 15:22:15.535505 kernel: raid6: sse2x1 gen() 7549 MB/s Dec 13 15:22:15.553092 kernel: raid6: sse2x1 xor() 4057 MB/s Dec 13 15:22:15.553209 kernel: raid6: using algorithm avx512x2 gen() 28094 MB/s Dec 13 15:22:15.553244 kernel: raid6: .... xor() 20838 MB/s, rmw enabled Dec 13 15:22:15.553822 kernel: raid6: using avx512x2 recovery algorithm Dec 13 15:22:15.568471 kernel: xor: automatically using best checksumming function avx Dec 13 15:22:15.676484 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 15:22:15.697973 systemd[1]: Finished dracut-pre-udev.service. Dec 13 15:22:15.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:15.699000 audit: BPF prog-id=7 op=LOAD Dec 13 15:22:15.699000 audit: BPF prog-id=8 op=LOAD Dec 13 15:22:15.700559 systemd[1]: Starting systemd-udevd.service... Dec 13 15:22:15.724164 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 15:22:15.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:15.730020 systemd[1]: Started systemd-udevd.service. Dec 13 15:22:15.734153 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 15:22:15.755494 dracut-pre-trigger[410]: rd.md=0: removing MD RAID activation Dec 13 15:22:15.804568 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 15:22:15.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:15.805924 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:22:15.865744 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:22:15.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:15.944461 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 15:22:15.963453 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Dec 13 15:22:15.998479 kernel: libata version 3.00 loaded. Dec 13 15:22:15.998504 kernel: ACPI: bus type USB registered Dec 13 15:22:15.998519 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 15:22:15.998532 kernel: GPT:17805311 != 125829119 Dec 13 15:22:15.998543 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 15:22:15.998554 kernel: GPT:17805311 != 125829119 Dec 13 15:22:15.998565 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 15:22:15.998577 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:22:15.998589 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 15:22:16.044571 kernel: usbcore: registered new interface driver usbfs Dec 13 15:22:16.044593 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 15:22:16.044607 kernel: usbcore: registered new interface driver hub Dec 13 15:22:16.044619 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 15:22:16.044633 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 15:22:16.044748 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 15:22:16.044853 kernel: usbcore: registered new device driver usb Dec 13 15:22:16.044866 kernel: AES CTR mode by8 optimization enabled Dec 13 15:22:16.044883 kernel: scsi host0: ahci Dec 13 15:22:16.044991 kernel: scsi host1: ahci Dec 13 15:22:16.045103 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (452) Dec 13 15:22:16.045116 kernel: scsi host2: ahci Dec 13 15:22:16.045212 kernel: scsi host3: ahci Dec 13 15:22:16.045306 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 15:22:16.045403 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Dec 13 15:22:16.045516 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Dec 13 15:22:16.045610 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 15:22:16.045701 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Dec 13 15:22:16.045800 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Dec 13 15:22:16.045892 kernel: hub 1-0:1.0: USB hub found Dec 13 15:22:16.046004 kernel: hub 1-0:1.0: 4 ports detected Dec 13 15:22:16.046107 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Dec 13 15:22:16.046289 kernel: hub 2-0:1.0: USB hub found Dec 13 15:22:16.046390 kernel: hub 2-0:1.0: 4 ports detected Dec 13 15:22:16.046519 kernel: scsi host4: ahci Dec 13 15:22:16.046620 kernel: scsi host5: ahci Dec 13 15:22:16.046726 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Dec 13 15:22:16.046740 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Dec 13 15:22:16.046756 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Dec 13 15:22:16.046775 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Dec 13 15:22:16.046788 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Dec 13 15:22:16.046800 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Dec 13 15:22:16.021759 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 15:22:16.086581 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 15:22:16.087071 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 15:22:16.091366 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 15:22:16.100365 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:22:16.101915 systemd[1]: Starting disk-uuid.service... Dec 13 15:22:16.112340 disk-uuid[528]: Primary Header is updated. Dec 13 15:22:16.112340 disk-uuid[528]: Secondary Entries is updated. Dec 13 15:22:16.112340 disk-uuid[528]: Secondary Header is updated. Dec 13 15:22:16.116568 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:22:16.275660 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Dec 13 15:22:16.353479 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 15:22:16.363571 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 15:22:16.363682 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 15:22:16.366540 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 15:22:16.366641 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 15:22:16.371492 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 15:22:16.420471 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 15:22:16.425589 kernel: usbcore: registered new interface driver usbhid Dec 13 15:22:16.425666 kernel: usbhid: USB HID core driver Dec 13 15:22:16.431762 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Dec 13 15:22:16.431840 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Dec 13 15:22:17.135486 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:22:17.139178 disk-uuid[529]: The operation has completed successfully. Dec 13 15:22:17.179725 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 15:22:17.179822 systemd[1]: Finished disk-uuid.service. Dec 13 15:22:17.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.197879 systemd[1]: Starting verity-setup.service... Dec 13 15:22:17.220632 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 15:22:17.281118 systemd[1]: Found device dev-mapper-usr.device. Dec 13 15:22:17.283848 systemd[1]: Mounting sysusr-usr.mount... Dec 13 15:22:17.285396 systemd[1]: Finished verity-setup.service. Dec 13 15:22:17.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.376945 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 15:22:17.377073 systemd[1]: Mounted sysusr-usr.mount. Dec 13 15:22:17.377641 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 15:22:17.394603 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:22:17.394633 kernel: BTRFS info (device vda6): using free space tree Dec 13 15:22:17.394646 kernel: BTRFS info (device vda6): has skinny extents Dec 13 15:22:17.378488 systemd[1]: Starting ignition-setup.service... Dec 13 15:22:17.395917 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 15:22:17.416131 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 15:22:17.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.422292 systemd[1]: Finished ignition-setup.service. Dec 13 15:22:17.423700 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 15:22:17.529276 ignition[631]: Ignition 2.14.0 Dec 13 15:22:17.530121 ignition[631]: Stage: fetch-offline Dec 13 15:22:17.530202 ignition[631]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:22:17.530241 ignition[631]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:22:17.531419 ignition[631]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:22:17.532988 ignition[631]: parsed url from cmdline: "" Dec 13 15:22:17.532995 ignition[631]: no config URL provided Dec 13 15:22:17.533001 ignition[631]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:22:17.533838 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 15:22:17.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.533010 ignition[631]: no config at "/usr/lib/ignition/user.ign" Dec 13 15:22:17.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.535127 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 15:22:17.533015 ignition[631]: failed to fetch config: resource requires networking Dec 13 15:22:17.536000 audit: BPF prog-id=9 op=LOAD Dec 13 15:22:17.533129 ignition[631]: Ignition finished successfully Dec 13 15:22:17.537169 systemd[1]: Starting systemd-networkd.service... Dec 13 15:22:17.568475 systemd-networkd[712]: lo: Link UP Dec 13 15:22:17.568493 systemd-networkd[712]: lo: Gained carrier Dec 13 15:22:17.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.569344 systemd-networkd[712]: Enumeration completed Dec 13 15:22:17.569710 systemd-networkd[712]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:22:17.570474 systemd[1]: Started systemd-networkd.service. Dec 13 15:22:17.571589 systemd-networkd[712]: eth0: Link UP Dec 13 15:22:17.571594 systemd-networkd[712]: eth0: Gained carrier Dec 13 15:22:17.572188 systemd[1]: Reached target network.target. Dec 13 15:22:17.575326 systemd[1]: Starting ignition-fetch.service... Dec 13 15:22:17.590455 ignition[714]: Ignition 2.14.0 Dec 13 15:22:17.584806 systemd[1]: Starting iscsiuio.service... Dec 13 15:22:17.590464 ignition[714]: Stage: fetch Dec 13 15:22:17.590598 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:22:17.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.595640 systemd[1]: Started iscsiuio.service. Dec 13 15:22:17.590619 ignition[714]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:22:17.597067 systemd[1]: Starting iscsid.service... Dec 13 15:22:17.591773 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:22:17.591889 ignition[714]: parsed url from cmdline: "" Dec 13 15:22:17.591893 ignition[714]: no config URL provided Dec 13 15:22:17.591899 ignition[714]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:22:17.591909 ignition[714]: no config at "/usr/lib/ignition/user.ign" Dec 13 15:22:17.601237 iscsid[723]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:22:17.601237 iscsid[723]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 15:22:17.601237 iscsid[723]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 15:22:17.601237 iscsid[723]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 15:22:17.601237 iscsid[723]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:22:17.601237 iscsid[723]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 15:22:17.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.608019 ignition[714]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 15:22:17.603194 systemd[1]: Started iscsid.service. Dec 13 15:22:17.608056 ignition[714]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 15:22:17.606116 systemd[1]: Starting dracut-initqueue.service... Dec 13 15:22:17.608703 ignition[714]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 15:22:17.613333 ignition[714]: GET error: Get "http://169.254.169.254/openstack/latest/user_data": dial tcp 169.254.169.254:80: connect: network is unreachable Dec 13 15:22:17.621738 systemd[1]: Finished dracut-initqueue.service. Dec 13 15:22:17.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.623104 systemd[1]: Reached target remote-fs-pre.target. Dec 13 15:22:17.624318 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:22:17.625771 systemd[1]: Reached target remote-fs.target. Dec 13 15:22:17.629276 systemd[1]: Starting dracut-pre-mount.service... Dec 13 15:22:17.641638 systemd-networkd[712]: eth0: DHCPv4 address 10.244.97.150/30, gateway 10.244.97.149 acquired from 10.244.97.149 Dec 13 15:22:17.649029 systemd[1]: Finished dracut-pre-mount.service. Dec 13 15:22:17.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.814515 ignition[714]: GET http://169.254.169.254/openstack/latest/user_data: attempt #2 Dec 13 15:22:17.833963 ignition[714]: GET result: OK Dec 13 15:22:17.835302 ignition[714]: parsing config with SHA512: b2c704e3e08cc9f2196e3a1371f70cc734239c3d76e27067cbf2160bef659364e67cb72c01f3c569f312c34964773fdcc67754a0b968d9d4bd426e780e56b631 Dec 13 15:22:17.848718 unknown[714]: fetched base config from "system" Dec 13 15:22:17.848734 unknown[714]: fetched base config from "system" Dec 13 15:22:17.849124 ignition[714]: fetch: fetch complete Dec 13 15:22:17.848741 unknown[714]: fetched user config from "openstack" Dec 13 15:22:17.849130 ignition[714]: fetch: fetch passed Dec 13 15:22:17.850900 systemd[1]: Finished ignition-fetch.service. Dec 13 15:22:17.849183 ignition[714]: Ignition finished successfully Dec 13 15:22:17.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.852991 systemd[1]: Starting ignition-kargs.service... Dec 13 15:22:17.864005 ignition[737]: Ignition 2.14.0 Dec 13 15:22:17.864017 ignition[737]: Stage: kargs Dec 13 15:22:17.864122 ignition[737]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:22:17.864139 ignition[737]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:22:17.865100 ignition[737]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:22:17.865979 ignition[737]: kargs: kargs passed Dec 13 15:22:17.866028 ignition[737]: Ignition finished successfully Dec 13 15:22:17.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.867129 systemd[1]: Finished ignition-kargs.service. Dec 13 15:22:17.868868 systemd[1]: Starting ignition-disks.service... Dec 13 15:22:17.877939 ignition[742]: Ignition 2.14.0 Dec 13 15:22:17.878571 ignition[742]: Stage: disks Dec 13 15:22:17.879025 ignition[742]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:22:17.879530 ignition[742]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:22:17.880516 ignition[742]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:22:17.881845 ignition[742]: disks: disks passed Dec 13 15:22:17.882248 ignition[742]: Ignition finished successfully Dec 13 15:22:17.883328 systemd[1]: Finished ignition-disks.service. Dec 13 15:22:17.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.883856 systemd[1]: Reached target initrd-root-device.target. Dec 13 15:22:17.884362 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:22:17.885048 systemd[1]: Reached target local-fs.target. Dec 13 15:22:17.885732 systemd[1]: Reached target sysinit.target. Dec 13 15:22:17.886366 systemd[1]: Reached target basic.target. Dec 13 15:22:17.888023 systemd[1]: Starting systemd-fsck-root.service... Dec 13 15:22:17.902343 systemd-fsck[749]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 15:22:17.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:17.905661 systemd[1]: Finished systemd-fsck-root.service. Dec 13 15:22:17.906832 systemd[1]: Mounting sysroot.mount... Dec 13 15:22:17.920460 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 15:22:17.921194 systemd[1]: Mounted sysroot.mount. Dec 13 15:22:17.922014 systemd[1]: Reached target initrd-root-fs.target. Dec 13 15:22:17.923965 systemd[1]: Mounting sysroot-usr.mount... Dec 13 15:22:17.925176 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 15:22:17.926395 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 15:22:17.927290 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 15:22:17.928016 systemd[1]: Reached target ignition-diskful.target. Dec 13 15:22:17.929687 systemd[1]: Mounted sysroot-usr.mount. Dec 13 15:22:17.931146 systemd[1]: Starting initrd-setup-root.service... Dec 13 15:22:17.937165 initrd-setup-root[760]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 15:22:17.950973 initrd-setup-root[768]: cut: /sysroot/etc/group: No such file or directory Dec 13 15:22:17.960786 initrd-setup-root[776]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 15:22:17.968106 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 15:22:18.012764 systemd[1]: Finished initrd-setup-root.service. Dec 13 15:22:18.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:18.023251 systemd[1]: Starting ignition-mount.service... Dec 13 15:22:18.025002 systemd[1]: Starting sysroot-boot.service... Dec 13 15:22:18.034694 bash[804]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 15:22:18.042945 coreos-metadata[755]: Dec 13 15:22:18.042 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 15:22:18.046229 ignition[805]: INFO : Ignition 2.14.0 Dec 13 15:22:18.046229 ignition[805]: INFO : Stage: mount Dec 13 15:22:18.046229 ignition[805]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:22:18.046229 ignition[805]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:22:18.048275 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:22:18.048762 ignition[805]: INFO : mount: mount passed Dec 13 15:22:18.048762 ignition[805]: INFO : Ignition finished successfully Dec 13 15:22:18.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:18.050334 systemd[1]: Finished ignition-mount.service. Dec 13 15:22:18.057442 systemd[1]: Finished sysroot-boot.service. Dec 13 15:22:18.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:18.060943 coreos-metadata[755]: Dec 13 15:22:18.060 INFO Fetch successful Dec 13 15:22:18.060943 coreos-metadata[755]: Dec 13 15:22:18.060 INFO wrote hostname srv-wk44l.gb1.brightbox.com to /sysroot/etc/hostname Dec 13 15:22:18.064409 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 15:22:18.064655 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 15:22:18.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:18.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:18.306069 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 15:22:18.317482 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (812) Dec 13 15:22:18.320179 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:22:18.320221 kernel: BTRFS info (device vda6): using free space tree Dec 13 15:22:18.320242 kernel: BTRFS info (device vda6): has skinny extents Dec 13 15:22:18.327536 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 15:22:18.330717 systemd[1]: Starting ignition-files.service... Dec 13 15:22:18.355067 ignition[832]: INFO : Ignition 2.14.0 Dec 13 15:22:18.355067 ignition[832]: INFO : Stage: files Dec 13 15:22:18.356075 ignition[832]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:22:18.356075 ignition[832]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:22:18.357290 ignition[832]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:22:18.361008 ignition[832]: DEBUG : files: compiled without relabeling support, skipping Dec 13 15:22:18.362733 ignition[832]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 15:22:18.362733 ignition[832]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 15:22:18.365499 ignition[832]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 15:22:18.365499 ignition[832]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 15:22:18.368502 ignition[832]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 15:22:18.368502 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 15:22:18.368502 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 15:22:18.368502 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:22:18.368502 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:22:18.366166 unknown[832]: wrote ssh authorized keys file for user: core Dec 13 15:22:18.371801 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:22:18.371801 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:22:18.371801 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:22:18.371801 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 15:22:18.768507 systemd-networkd[712]: eth0: Gained IPv6LL Dec 13 15:22:19.034754 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 15:22:20.281232 systemd-networkd[712]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:1865:24:19ff:fef4:6196/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:1865:24:19ff:fef4:6196/64 assigned by NDisc. Dec 13 15:22:20.281251 systemd-networkd[712]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 15:22:22.888400 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:22:22.892397 ignition[832]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:22:22.892397 ignition[832]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:22:22.892397 ignition[832]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:22:22.894229 ignition[832]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:22:22.906306 ignition[832]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:22:22.906306 ignition[832]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:22:22.906306 ignition[832]: INFO : files: files passed Dec 13 15:22:22.906306 ignition[832]: INFO : Ignition finished successfully Dec 13 15:22:22.911775 systemd[1]: Finished ignition-files.service. Dec 13 15:22:22.923468 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 15:22:22.923757 kernel: audit: type=1130 audit(1734103342.914:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.918493 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 15:22:22.931962 kernel: audit: type=1130 audit(1734103342.925:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.931988 kernel: audit: type=1131 audit(1734103342.925:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.919874 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 15:22:22.936132 kernel: audit: type=1130 audit(1734103342.932:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.936197 initrd-setup-root-after-ignition[857]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 15:22:22.920810 systemd[1]: Starting ignition-quench.service... Dec 13 15:22:22.925057 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 15:22:22.925164 systemd[1]: Finished ignition-quench.service. Dec 13 15:22:22.932099 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 15:22:22.932734 systemd[1]: Reached target ignition-complete.target. Dec 13 15:22:22.937319 systemd[1]: Starting initrd-parse-etc.service... Dec 13 15:22:22.955319 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 15:22:22.955938 systemd[1]: Finished initrd-parse-etc.service. Dec 13 15:22:22.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.956926 systemd[1]: Reached target initrd-fs.target. Dec 13 15:22:22.962396 kernel: audit: type=1130 audit(1734103342.956:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.962435 kernel: audit: type=1131 audit(1734103342.956:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.963367 systemd[1]: Reached target initrd.target. Dec 13 15:22:22.964937 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 15:22:22.966880 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 15:22:22.979599 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 15:22:22.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.983443 kernel: audit: type=1130 audit(1734103342.979:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.984043 systemd[1]: Starting initrd-cleanup.service... Dec 13 15:22:22.995531 systemd[1]: Stopped target nss-lookup.target. Dec 13 15:22:22.996013 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 15:22:22.996756 systemd[1]: Stopped target timers.target. Dec 13 15:22:22.997417 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 15:22:22.997538 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 15:22:23.012164 kernel: audit: type=1131 audit(1734103342.997:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:22.998170 systemd[1]: Stopped target initrd.target. Dec 13 15:22:23.013601 systemd[1]: Stopped target basic.target. Dec 13 15:22:23.014516 systemd[1]: Stopped target ignition-complete.target. Dec 13 15:22:23.015350 systemd[1]: Stopped target ignition-diskful.target. Dec 13 15:22:23.016184 systemd[1]: Stopped target initrd-root-device.target. Dec 13 15:22:23.017025 systemd[1]: Stopped target remote-fs.target. Dec 13 15:22:23.017827 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 15:22:23.018651 systemd[1]: Stopped target sysinit.target. Dec 13 15:22:23.019475 systemd[1]: Stopped target local-fs.target. Dec 13 15:22:23.020286 systemd[1]: Stopped target local-fs-pre.target. Dec 13 15:22:23.021099 systemd[1]: Stopped target swap.target. Dec 13 15:22:23.021856 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 15:22:23.022417 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 15:22:23.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.026071 systemd[1]: Stopped target cryptsetup.target. Dec 13 15:22:23.026883 kernel: audit: type=1131 audit(1734103343.022:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.026673 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 15:22:23.026859 systemd[1]: Stopped dracut-initqueue.service. Dec 13 15:22:23.034690 kernel: audit: type=1131 audit(1734103343.027:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.027817 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 15:22:23.028041 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 15:22:23.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.037332 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 15:22:23.037912 systemd[1]: Stopped ignition-files.service. Dec 13 15:22:23.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.039876 systemd[1]: Stopping ignition-mount.service... Dec 13 15:22:23.040960 systemd[1]: Stopping iscsid.service... Dec 13 15:22:23.041689 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 15:22:23.042245 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 15:22:23.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.044069 systemd[1]: Stopping sysroot-boot.service... Dec 13 15:22:23.044652 iscsid[723]: iscsid shutting down. Dec 13 15:22:23.045449 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 15:22:23.046114 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 15:22:23.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.047217 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 15:22:23.047853 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 15:22:23.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.054610 ignition[870]: INFO : Ignition 2.14.0 Dec 13 15:22:23.054610 ignition[870]: INFO : Stage: umount Dec 13 15:22:23.055499 ignition[870]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:22:23.055499 ignition[870]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:22:23.056684 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:22:23.057886 ignition[870]: INFO : umount: umount passed Dec 13 15:22:23.057886 ignition[870]: INFO : Ignition finished successfully Dec 13 15:22:23.058302 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 15:22:23.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.058397 systemd[1]: Stopped iscsid.service. Dec 13 15:22:23.060087 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 15:22:23.061390 systemd[1]: Stopped ignition-mount.service. Dec 13 15:22:23.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.062587 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 15:22:23.062697 systemd[1]: Stopped ignition-disks.service. Dec 13 15:22:23.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.063948 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 15:22:23.063986 systemd[1]: Stopped ignition-kargs.service. Dec 13 15:22:23.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.065199 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 15:22:23.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.065237 systemd[1]: Stopped ignition-fetch.service. Dec 13 15:22:23.065750 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 15:22:23.065788 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 15:22:23.066144 systemd[1]: Stopped target paths.target. Dec 13 15:22:23.067520 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 15:22:23.072520 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 15:22:23.072925 systemd[1]: Stopped target slices.target. Dec 13 15:22:23.073592 systemd[1]: Stopped target sockets.target. Dec 13 15:22:23.074235 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 15:22:23.074280 systemd[1]: Closed iscsid.socket. Dec 13 15:22:23.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.074833 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 15:22:23.074870 systemd[1]: Stopped ignition-setup.service. Dec 13 15:22:23.076331 systemd[1]: Stopping iscsiuio.service... Dec 13 15:22:23.079321 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 15:22:23.079822 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 15:22:23.079910 systemd[1]: Stopped iscsiuio.service. Dec 13 15:22:23.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.080778 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 15:22:23.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.080853 systemd[1]: Finished initrd-cleanup.service. Dec 13 15:22:23.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.081484 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 15:22:23.081557 systemd[1]: Stopped sysroot-boot.service. Dec 13 15:22:23.082697 systemd[1]: Stopped target network.target. Dec 13 15:22:23.083350 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 15:22:23.083383 systemd[1]: Closed iscsiuio.socket. Dec 13 15:22:23.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.084016 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 15:22:23.084051 systemd[1]: Stopped initrd-setup-root.service. Dec 13 15:22:23.084782 systemd[1]: Stopping systemd-networkd.service... Dec 13 15:22:23.086104 systemd[1]: Stopping systemd-resolved.service... Dec 13 15:22:23.089492 systemd-networkd[712]: eth0: DHCPv6 lease lost Dec 13 15:22:23.090677 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 15:22:23.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.090776 systemd[1]: Stopped systemd-networkd.service. Dec 13 15:22:23.093213 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 15:22:23.093318 systemd[1]: Stopped systemd-resolved.service. Dec 13 15:22:23.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.094000 audit: BPF prog-id=9 op=UNLOAD Dec 13 15:22:23.094619 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 15:22:23.094663 systemd[1]: Closed systemd-networkd.socket. Dec 13 15:22:23.095000 audit: BPF prog-id=6 op=UNLOAD Dec 13 15:22:23.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.096194 systemd[1]: Stopping network-cleanup.service... Dec 13 15:22:23.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.096590 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 15:22:23.096648 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 15:22:23.097043 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 15:22:23.097078 systemd[1]: Stopped systemd-sysctl.service. Dec 13 15:22:23.097517 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 15:22:23.097550 systemd[1]: Stopped systemd-modules-load.service. Dec 13 15:22:23.098130 systemd[1]: Stopping systemd-udevd.service... Dec 13 15:22:23.099671 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 15:22:23.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.102912 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 15:22:23.103040 systemd[1]: Stopped systemd-udevd.service. Dec 13 15:22:23.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.103656 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 15:22:23.103731 systemd[1]: Stopped network-cleanup.service. Dec 13 15:22:23.104547 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 15:22:23.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.104582 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 15:22:23.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.105111 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 15:22:23.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.105139 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 15:22:23.105789 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 15:22:23.105824 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 15:22:23.106496 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 15:22:23.106531 systemd[1]: Stopped dracut-cmdline.service. Dec 13 15:22:23.107223 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 15:22:23.107254 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 15:22:23.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.108552 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 15:22:23.109026 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 15:22:23.109084 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 15:22:23.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.121718 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 15:22:23.121921 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 15:22:23.123341 systemd[1]: Reached target initrd-switch-root.target. Dec 13 15:22:23.126895 systemd[1]: Starting initrd-switch-root.service... Dec 13 15:22:23.150396 systemd[1]: Switching root. Dec 13 15:22:23.172451 systemd-journald[201]: Received SIGTERM from PID 1 (systemd). Dec 13 15:22:23.172560 systemd-journald[201]: Journal stopped Dec 13 15:22:26.272771 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 15:22:26.272907 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 15:22:26.272927 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 15:22:26.272943 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 15:22:26.272956 kernel: SELinux: policy capability open_perms=1 Dec 13 15:22:26.272976 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 15:22:26.272990 kernel: SELinux: policy capability always_check_network=0 Dec 13 15:22:26.273021 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 15:22:26.273043 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 15:22:26.273059 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 15:22:26.273084 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 15:22:26.273099 systemd[1]: Successfully loaded SELinux policy in 47.814ms. Dec 13 15:22:26.273157 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.520ms. Dec 13 15:22:26.273176 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:22:26.273190 systemd[1]: Detected virtualization kvm. Dec 13 15:22:26.273207 systemd[1]: Detected architecture x86-64. Dec 13 15:22:26.273226 systemd[1]: Detected first boot. Dec 13 15:22:26.273251 systemd[1]: Hostname set to . Dec 13 15:22:26.273270 systemd[1]: Initializing machine ID from VM UUID. Dec 13 15:22:26.273283 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 15:22:26.273297 systemd[1]: Populated /etc with preset unit settings. Dec 13 15:22:26.273314 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:22:26.273335 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:22:26.273353 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:22:26.273373 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 15:22:26.273393 systemd[1]: Stopped initrd-switch-root.service. Dec 13 15:22:26.273406 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 15:22:26.273419 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 15:22:26.273460 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 15:22:26.273473 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 15:22:26.273488 systemd[1]: Created slice system-getty.slice. Dec 13 15:22:26.273508 systemd[1]: Created slice system-modprobe.slice. Dec 13 15:22:26.273526 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 15:22:26.273540 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 15:22:26.273553 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 15:22:26.273567 systemd[1]: Created slice user.slice. Dec 13 15:22:26.273584 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:22:26.273599 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 15:22:26.273619 systemd[1]: Set up automount boot.automount. Dec 13 15:22:26.273637 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 15:22:26.273651 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 15:22:26.273668 systemd[1]: Stopped target initrd-fs.target. Dec 13 15:22:26.273685 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 15:22:26.273698 systemd[1]: Reached target integritysetup.target. Dec 13 15:22:26.273716 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:22:26.273746 systemd[1]: Reached target remote-fs.target. Dec 13 15:22:26.273760 systemd[1]: Reached target slices.target. Dec 13 15:22:26.273773 systemd[1]: Reached target swap.target. Dec 13 15:22:26.273793 systemd[1]: Reached target torcx.target. Dec 13 15:22:26.273807 systemd[1]: Reached target veritysetup.target. Dec 13 15:22:26.273823 systemd[1]: Listening on systemd-coredump.socket. Dec 13 15:22:26.273849 systemd[1]: Listening on systemd-initctl.socket. Dec 13 15:22:26.273867 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:22:26.273884 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:22:26.273901 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:22:26.273915 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 15:22:26.273933 systemd[1]: Mounting dev-hugepages.mount... Dec 13 15:22:26.273946 systemd[1]: Mounting dev-mqueue.mount... Dec 13 15:22:26.273961 systemd[1]: Mounting media.mount... Dec 13 15:22:26.273975 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:22:26.273989 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 15:22:26.274005 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 15:22:26.274018 systemd[1]: Mounting tmp.mount... Dec 13 15:22:26.274045 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 15:22:26.274079 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:22:26.274093 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:22:26.274106 systemd[1]: Starting modprobe@configfs.service... Dec 13 15:22:26.274119 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:22:26.274133 systemd[1]: Starting modprobe@drm.service... Dec 13 15:22:26.274146 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:22:26.274159 systemd[1]: Starting modprobe@fuse.service... Dec 13 15:22:26.274172 systemd[1]: Starting modprobe@loop.service... Dec 13 15:22:26.274193 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 15:22:26.274210 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 15:22:26.274223 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 15:22:26.274236 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 15:22:26.274250 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 15:22:26.274265 systemd[1]: Stopped systemd-journald.service. Dec 13 15:22:26.274281 systemd[1]: Starting systemd-journald.service... Dec 13 15:22:26.274296 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:22:26.274310 systemd[1]: Starting systemd-network-generator.service... Dec 13 15:22:26.274326 systemd[1]: Starting systemd-remount-fs.service... Dec 13 15:22:26.274340 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:22:26.274354 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 15:22:26.274367 systemd[1]: Stopped verity-setup.service. Dec 13 15:22:26.274380 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:22:26.274394 systemd[1]: Mounted dev-hugepages.mount. Dec 13 15:22:26.274407 systemd[1]: Mounted dev-mqueue.mount. Dec 13 15:22:26.274421 systemd[1]: Mounted media.mount. Dec 13 15:22:26.274467 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 15:22:26.274490 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 15:22:26.274503 systemd[1]: Mounted tmp.mount. Dec 13 15:22:26.274521 kernel: fuse: init (API version 7.34) Dec 13 15:22:26.274535 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:22:26.274548 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 15:22:26.274561 systemd[1]: Finished modprobe@configfs.service. Dec 13 15:22:26.274577 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:22:26.274591 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:22:26.274610 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:22:26.274623 systemd[1]: Finished modprobe@drm.service. Dec 13 15:22:26.274637 kernel: loop: module loaded Dec 13 15:22:26.274649 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:22:26.274662 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:22:26.274679 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 15:22:26.274699 systemd[1]: Finished modprobe@fuse.service. Dec 13 15:22:26.274717 systemd-journald[972]: Journal started Dec 13 15:22:26.274787 systemd-journald[972]: Runtime Journal (/run/log/journal/5b83280f60294b0ebb5b573abf154262) is 4.7M, max 38.1M, 33.3M free. Dec 13 15:22:23.296000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 15:22:23.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:22:23.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:22:23.346000 audit: BPF prog-id=10 op=LOAD Dec 13 15:22:23.346000 audit: BPF prog-id=10 op=UNLOAD Dec 13 15:22:23.347000 audit: BPF prog-id=11 op=LOAD Dec 13 15:22:23.347000 audit: BPF prog-id=11 op=UNLOAD Dec 13 15:22:23.436000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 15:22:23.436000 audit[902]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:23.436000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:22:23.438000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 15:22:23.438000 audit[902]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:23.438000 audit: CWD cwd="/" Dec 13 15:22:23.438000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:23.438000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:23.438000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:22:26.050000 audit: BPF prog-id=12 op=LOAD Dec 13 15:22:26.050000 audit: BPF prog-id=3 op=UNLOAD Dec 13 15:22:26.050000 audit: BPF prog-id=13 op=LOAD Dec 13 15:22:26.050000 audit: BPF prog-id=14 op=LOAD Dec 13 15:22:26.051000 audit: BPF prog-id=4 op=UNLOAD Dec 13 15:22:26.051000 audit: BPF prog-id=5 op=UNLOAD Dec 13 15:22:26.051000 audit: BPF prog-id=15 op=LOAD Dec 13 15:22:26.051000 audit: BPF prog-id=12 op=UNLOAD Dec 13 15:22:26.051000 audit: BPF prog-id=16 op=LOAD Dec 13 15:22:26.051000 audit: BPF prog-id=17 op=LOAD Dec 13 15:22:26.051000 audit: BPF prog-id=13 op=UNLOAD Dec 13 15:22:26.051000 audit: BPF prog-id=14 op=UNLOAD Dec 13 15:22:26.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.064000 audit: BPF prog-id=15 op=UNLOAD Dec 13 15:22:26.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.186000 audit: BPF prog-id=18 op=LOAD Dec 13 15:22:26.186000 audit: BPF prog-id=19 op=LOAD Dec 13 15:22:26.186000 audit: BPF prog-id=20 op=LOAD Dec 13 15:22:26.192000 audit: BPF prog-id=17 op=UNLOAD Dec 13 15:22:26.192000 audit: BPF prog-id=16 op=UNLOAD Dec 13 15:22:26.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.276225 systemd[1]: Started systemd-journald.service. Dec 13 15:22:26.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.271000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 15:22:26.271000 audit[972]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe1b2db260 a2=4000 a3=7ffe1b2db2fc items=0 ppid=1 pid=972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:26.271000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 15:22:26.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.434973 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:22:26.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.048451 systemd[1]: Queued start job for default target multi-user.target. Dec 13 15:22:23.435560 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:22:26.048465 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 15:22:23.435582 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:22:26.052786 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 15:22:23.435618 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 15:22:26.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.277006 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:22:23.435629 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 15:22:26.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.278568 systemd[1]: Finished systemd-network-generator.service. Dec 13 15:22:23.435664 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 15:22:23.435678 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 15:22:23.435886 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 15:22:26.279293 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:22:26.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:23.435929 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:22:26.279417 systemd[1]: Finished modprobe@loop.service. Dec 13 15:22:23.435945 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:22:23.436420 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 15:22:23.436469 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 15:22:23.436489 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 15:22:23.436505 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 15:22:23.436525 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 15:22:23.436541 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 15:22:25.673781 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:22:25.674048 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:22:25.674202 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:22:25.674421 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:22:25.674498 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 15:22:25.674564 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:22:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 15:22:26.281819 systemd[1]: Finished systemd-remount-fs.service. Dec 13 15:22:26.283147 systemd[1]: Reached target network-pre.target. Dec 13 15:22:26.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.285483 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 15:22:26.287527 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 15:22:26.291804 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 15:22:26.295663 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 15:22:26.297530 systemd[1]: Starting systemd-journal-flush.service... Dec 13 15:22:26.298027 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:22:26.300064 systemd[1]: Starting systemd-random-seed.service... Dec 13 15:22:26.300651 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:22:26.302272 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:22:26.304874 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 15:22:26.306456 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 15:22:26.318587 systemd-journald[972]: Time spent on flushing to /var/log/journal/5b83280f60294b0ebb5b573abf154262 is 67.538ms for 1293 entries. Dec 13 15:22:26.318587 systemd-journald[972]: System Journal (/var/log/journal/5b83280f60294b0ebb5b573abf154262) is 8.0M, max 584.8M, 576.8M free. Dec 13 15:22:26.392127 systemd-journald[972]: Received client request to flush runtime journal. Dec 13 15:22:26.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.327082 systemd[1]: Finished systemd-random-seed.service. Dec 13 15:22:26.327717 systemd[1]: Reached target first-boot-complete.target. Dec 13 15:22:26.348079 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:22:26.376902 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 15:22:26.378993 systemd[1]: Starting systemd-sysusers.service... Dec 13 15:22:26.393290 systemd[1]: Finished systemd-journal-flush.service. Dec 13 15:22:26.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.408838 systemd[1]: Finished systemd-sysusers.service. Dec 13 15:22:26.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.412880 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:22:26.414989 systemd[1]: Starting systemd-udev-settle.service... Dec 13 15:22:26.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.427796 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 15:22:26.953341 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 15:22:26.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:26.955000 audit: BPF prog-id=21 op=LOAD Dec 13 15:22:26.955000 audit: BPF prog-id=22 op=LOAD Dec 13 15:22:26.955000 audit: BPF prog-id=7 op=UNLOAD Dec 13 15:22:26.955000 audit: BPF prog-id=8 op=UNLOAD Dec 13 15:22:26.957687 systemd[1]: Starting systemd-udevd.service... Dec 13 15:22:26.978313 systemd-udevd[1014]: Using default interface naming scheme 'v252'. Dec 13 15:22:27.001553 systemd[1]: Started systemd-udevd.service. Dec 13 15:22:27.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.007000 audit: BPF prog-id=23 op=LOAD Dec 13 15:22:27.010297 systemd[1]: Starting systemd-networkd.service... Dec 13 15:22:27.018000 audit: BPF prog-id=24 op=LOAD Dec 13 15:22:27.019000 audit: BPF prog-id=25 op=LOAD Dec 13 15:22:27.019000 audit: BPF prog-id=26 op=LOAD Dec 13 15:22:27.020241 systemd[1]: Starting systemd-userdbd.service... Dec 13 15:22:27.053493 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 15:22:27.077254 systemd[1]: Started systemd-userdbd.service. Dec 13 15:22:27.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.133516 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:22:27.150834 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 15:22:27.167450 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 15:22:27.174240 systemd-networkd[1029]: lo: Link UP Dec 13 15:22:27.174249 systemd-networkd[1029]: lo: Gained carrier Dec 13 15:22:27.174800 systemd-networkd[1029]: Enumeration completed Dec 13 15:22:27.175622 kernel: ACPI: button: Power Button [PWRF] Dec 13 15:22:27.174905 systemd[1]: Started systemd-networkd.service. Dec 13 15:22:27.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.175016 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:22:27.177024 systemd-networkd[1029]: eth0: Link UP Dec 13 15:22:27.177033 systemd-networkd[1029]: eth0: Gained carrier Dec 13 15:22:27.188610 systemd-networkd[1029]: eth0: DHCPv4 address 10.244.97.150/30, gateway 10.244.97.149 acquired from 10.244.97.149 Dec 13 15:22:27.202000 audit[1016]: AVC avc: denied { confidentiality } for pid=1016 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 15:22:27.202000 audit[1016]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56500d05b410 a1=337fc a2=7f8d9a5d7bc5 a3=5 items=110 ppid=1014 pid=1016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:27.202000 audit: CWD cwd="/" Dec 13 15:22:27.202000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=1 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=2 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=3 name=(null) inode=14013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=4 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=5 name=(null) inode=14014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=6 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=7 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=8 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=9 name=(null) inode=14016 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=10 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=11 name=(null) inode=14017 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=12 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=13 name=(null) inode=14018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=14 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=15 name=(null) inode=14019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=16 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=17 name=(null) inode=14020 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=18 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=19 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=20 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=21 name=(null) inode=14022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=22 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=23 name=(null) inode=14023 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=24 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=25 name=(null) inode=14024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=26 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=27 name=(null) inode=14025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=28 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=29 name=(null) inode=14026 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=30 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=31 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=32 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=33 name=(null) inode=14028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=34 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=35 name=(null) inode=14029 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=36 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=37 name=(null) inode=14030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=38 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=39 name=(null) inode=14031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=40 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=41 name=(null) inode=14032 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=42 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=43 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=44 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=45 name=(null) inode=14034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=46 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=47 name=(null) inode=14035 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=48 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=49 name=(null) inode=14036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=50 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=51 name=(null) inode=14037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=52 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=53 name=(null) inode=14038 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=55 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=56 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=57 name=(null) inode=14040 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=58 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=59 name=(null) inode=14041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=60 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=61 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=62 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=63 name=(null) inode=14043 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=64 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=65 name=(null) inode=14044 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=66 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=67 name=(null) inode=14045 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=68 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=69 name=(null) inode=14046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=70 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=71 name=(null) inode=14047 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=72 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=73 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=74 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=75 name=(null) inode=14049 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=76 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=77 name=(null) inode=14050 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=78 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=79 name=(null) inode=14051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=80 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=81 name=(null) inode=14052 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=82 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=83 name=(null) inode=14053 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=84 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=85 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=86 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=87 name=(null) inode=14055 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=88 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=89 name=(null) inode=14056 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=90 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=91 name=(null) inode=14057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=92 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=93 name=(null) inode=14058 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=94 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=95 name=(null) inode=14059 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=96 name=(null) inode=14039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=97 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=98 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=99 name=(null) inode=14061 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=100 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=101 name=(null) inode=14062 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=102 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=103 name=(null) inode=14063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=104 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=105 name=(null) inode=14064 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=106 name=(null) inode=14060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=107 name=(null) inode=14065 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PATH item=109 name=(null) inode=14066 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:27.202000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 15:22:27.238448 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 15:22:27.256455 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 15:22:27.269511 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 15:22:27.269670 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 15:22:27.397619 systemd[1]: Finished systemd-udev-settle.service. Dec 13 15:22:27.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.401746 systemd[1]: Starting lvm2-activation-early.service... Dec 13 15:22:27.435250 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:22:27.470117 systemd[1]: Finished lvm2-activation-early.service. Dec 13 15:22:27.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.471537 systemd[1]: Reached target cryptsetup.target. Dec 13 15:22:27.475276 systemd[1]: Starting lvm2-activation.service... Dec 13 15:22:27.485875 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:22:27.514878 systemd[1]: Finished lvm2-activation.service. Dec 13 15:22:27.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.515634 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:22:27.516127 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 15:22:27.516165 systemd[1]: Reached target local-fs.target. Dec 13 15:22:27.516635 systemd[1]: Reached target machines.target. Dec 13 15:22:27.518900 systemd[1]: Starting ldconfig.service... Dec 13 15:22:27.520178 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:22:27.520377 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:22:27.521794 systemd[1]: Starting systemd-boot-update.service... Dec 13 15:22:27.524350 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 15:22:27.530915 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 15:22:27.533101 systemd[1]: Starting systemd-sysext.service... Dec 13 15:22:27.540685 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1046 (bootctl) Dec 13 15:22:27.541906 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 15:22:27.553658 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 15:22:27.559971 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 15:22:27.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.565798 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 15:22:27.566005 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 15:22:27.589471 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 15:22:27.597673 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 15:22:27.598529 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 15:22:27.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.628450 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 15:22:27.646570 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 15:22:27.660118 systemd-fsck[1055]: fsck.fat 4.2 (2021-01-31) Dec 13 15:22:27.660118 systemd-fsck[1055]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 15:22:27.663235 (sd-sysext)[1058]: Using extensions 'kubernetes'. Dec 13 15:22:27.665675 (sd-sysext)[1058]: Merged extensions into '/usr'. Dec 13 15:22:27.669532 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 15:22:27.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.671633 systemd[1]: Mounting boot.mount... Dec 13 15:22:27.695012 systemd[1]: Mounted boot.mount. Dec 13 15:22:27.695698 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:22:27.697499 systemd[1]: Mounting usr-share-oem.mount... Dec 13 15:22:27.700829 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:22:27.705141 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:22:27.708189 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:22:27.710970 systemd[1]: Starting modprobe@loop.service... Dec 13 15:22:27.712571 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:22:27.712740 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:22:27.712900 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:22:27.717565 systemd[1]: Finished systemd-boot-update.service. Dec 13 15:22:27.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.718815 systemd[1]: Mounted usr-share-oem.mount. Dec 13 15:22:27.720693 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:22:27.720818 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:22:27.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.721594 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:22:27.722056 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:22:27.722165 systemd[1]: Finished modprobe@loop.service. Dec 13 15:22:27.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.724611 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:22:27.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.724738 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:22:27.725359 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:22:27.728129 systemd[1]: Finished systemd-sysext.service. Dec 13 15:22:27.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:27.729806 systemd[1]: Starting ensure-sysext.service... Dec 13 15:22:27.731466 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 15:22:27.743548 systemd[1]: Reloading. Dec 13 15:22:27.762268 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 15:22:27.767583 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 15:22:27.776617 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 15:22:27.856946 /usr/lib/systemd/system-generators/torcx-generator[1089]: time="2024-12-13T15:22:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:22:27.857338 /usr/lib/systemd/system-generators/torcx-generator[1089]: time="2024-12-13T15:22:27Z" level=info msg="torcx already run" Dec 13 15:22:27.885522 ldconfig[1045]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 15:22:27.950063 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:22:27.950279 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:22:27.970613 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:22:28.027000 audit: BPF prog-id=27 op=LOAD Dec 13 15:22:28.032549 kernel: kauditd_printk_skb: 240 callbacks suppressed Dec 13 15:22:28.032797 kernel: audit: type=1334 audit(1734103348.027:166): prog-id=27 op=LOAD Dec 13 15:22:28.031000 audit: BPF prog-id=24 op=UNLOAD Dec 13 15:22:28.035250 kernel: audit: type=1334 audit(1734103348.031:167): prog-id=24 op=UNLOAD Dec 13 15:22:28.035288 kernel: audit: type=1334 audit(1734103348.033:168): prog-id=28 op=LOAD Dec 13 15:22:28.033000 audit: BPF prog-id=28 op=LOAD Dec 13 15:22:28.035000 audit: BPF prog-id=29 op=LOAD Dec 13 15:22:28.037380 kernel: audit: type=1334 audit(1734103348.035:169): prog-id=29 op=LOAD Dec 13 15:22:28.038399 kernel: audit: type=1334 audit(1734103348.036:170): prog-id=25 op=UNLOAD Dec 13 15:22:28.038439 kernel: audit: type=1334 audit(1734103348.036:171): prog-id=26 op=UNLOAD Dec 13 15:22:28.036000 audit: BPF prog-id=25 op=UNLOAD Dec 13 15:22:28.036000 audit: BPF prog-id=26 op=UNLOAD Dec 13 15:22:28.040000 audit: BPF prog-id=30 op=LOAD Dec 13 15:22:28.041000 audit: BPF prog-id=31 op=LOAD Dec 13 15:22:28.043114 kernel: audit: type=1334 audit(1734103348.040:172): prog-id=30 op=LOAD Dec 13 15:22:28.043173 kernel: audit: type=1334 audit(1734103348.041:173): prog-id=31 op=LOAD Dec 13 15:22:28.043203 kernel: audit: type=1334 audit(1734103348.041:174): prog-id=21 op=UNLOAD Dec 13 15:22:28.041000 audit: BPF prog-id=21 op=UNLOAD Dec 13 15:22:28.041000 audit: BPF prog-id=22 op=UNLOAD Dec 13 15:22:28.045118 kernel: audit: type=1334 audit(1734103348.041:175): prog-id=22 op=UNLOAD Dec 13 15:22:28.043000 audit: BPF prog-id=32 op=LOAD Dec 13 15:22:28.043000 audit: BPF prog-id=18 op=UNLOAD Dec 13 15:22:28.044000 audit: BPF prog-id=33 op=LOAD Dec 13 15:22:28.045000 audit: BPF prog-id=34 op=LOAD Dec 13 15:22:28.045000 audit: BPF prog-id=19 op=UNLOAD Dec 13 15:22:28.045000 audit: BPF prog-id=20 op=UNLOAD Dec 13 15:22:28.046000 audit: BPF prog-id=35 op=LOAD Dec 13 15:22:28.046000 audit: BPF prog-id=23 op=UNLOAD Dec 13 15:22:28.049902 systemd[1]: Finished ldconfig.service. Dec 13 15:22:28.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.052826 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 15:22:28.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.059098 systemd[1]: Starting audit-rules.service... Dec 13 15:22:28.061072 systemd[1]: Starting clean-ca-certificates.service... Dec 13 15:22:28.067000 audit: BPF prog-id=36 op=LOAD Dec 13 15:22:28.063693 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 15:22:28.071019 systemd[1]: Starting systemd-resolved.service... Dec 13 15:22:28.072000 audit: BPF prog-id=37 op=LOAD Dec 13 15:22:28.073488 systemd[1]: Starting systemd-timesyncd.service... Dec 13 15:22:28.077147 systemd[1]: Starting systemd-update-utmp.service... Dec 13 15:22:28.078310 systemd[1]: Finished clean-ca-certificates.service. Dec 13 15:22:28.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.082098 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:22:28.084672 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:22:28.088056 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:22:28.091397 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:22:28.095048 systemd[1]: Starting modprobe@loop.service... Dec 13 15:22:28.095553 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:22:28.095710 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:22:28.095853 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:22:28.096890 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:22:28.097670 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:22:28.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.098632 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:22:28.098756 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:22:28.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.099443 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:22:28.102205 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:22:28.103621 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:22:28.106972 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:22:28.107477 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:22:28.107623 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:22:28.107790 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:22:28.108758 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:22:28.108945 systemd[1]: Finished modprobe@loop.service. Dec 13 15:22:28.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.110134 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:22:28.110273 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:22:28.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.111106 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:22:28.116367 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:22:28.117799 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:22:28.119919 systemd[1]: Starting modprobe@drm.service... Dec 13 15:22:28.122628 systemd[1]: Starting modprobe@loop.service... Dec 13 15:22:28.123445 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:22:28.123607 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:22:28.126000 audit[1141]: SYSTEM_BOOT pid=1141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.127670 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 15:22:28.128268 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:22:28.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.129373 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:22:28.129571 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:22:28.133644 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:22:28.135360 systemd[1]: Finished ensure-sysext.service. Dec 13 15:22:28.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.136347 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:22:28.136948 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:22:28.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.141054 systemd[1]: Finished systemd-update-utmp.service. Dec 13 15:22:28.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.148997 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:22:28.149124 systemd[1]: Finished modprobe@loop.service. Dec 13 15:22:28.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.149631 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:22:28.149983 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:22:28.150097 systemd[1]: Finished modprobe@drm.service. Dec 13 15:22:28.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.150744 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 15:22:28.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.152774 systemd[1]: Starting systemd-update-done.service... Dec 13 15:22:28.166774 systemd[1]: Finished systemd-update-done.service. Dec 13 15:22:28.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.175000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 15:22:28.175000 audit[1163]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffcf28b9f0 a2=420 a3=0 items=0 ppid=1133 pid=1163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:28.175000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 15:22:28.176366 augenrules[1163]: No rules Dec 13 15:22:28.176540 systemd[1]: Finished audit-rules.service. Dec 13 15:22:28.196584 systemd-resolved[1137]: Positive Trust Anchors: Dec 13 15:22:28.196909 systemd-resolved[1137]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:22:28.197006 systemd-resolved[1137]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:22:28.201074 systemd[1]: Started systemd-timesyncd.service. Dec 13 15:22:28.201642 systemd[1]: Reached target time-set.target. Dec 13 15:22:28.204129 systemd-resolved[1137]: Using system hostname 'srv-wk44l.gb1.brightbox.com'. Dec 13 15:22:28.205986 systemd[1]: Started systemd-resolved.service. Dec 13 15:22:28.206476 systemd[1]: Reached target network.target. Dec 13 15:22:28.206817 systemd[1]: Reached target nss-lookup.target. Dec 13 15:22:28.207179 systemd[1]: Reached target sysinit.target. Dec 13 15:22:28.207623 systemd[1]: Started motdgen.path. Dec 13 15:22:28.207985 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 15:22:28.208554 systemd[1]: Started logrotate.timer. Dec 13 15:22:28.208987 systemd[1]: Started mdadm.timer. Dec 13 15:22:28.209312 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 15:22:28.209679 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 15:22:28.209713 systemd[1]: Reached target paths.target. Dec 13 15:22:28.210047 systemd[1]: Reached target timers.target. Dec 13 15:22:28.210713 systemd[1]: Listening on dbus.socket. Dec 13 15:22:28.212353 systemd[1]: Starting docker.socket... Dec 13 15:22:28.215847 systemd[1]: Listening on sshd.socket. Dec 13 15:22:28.216348 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:22:28.216825 systemd[1]: Listening on docker.socket. Dec 13 15:22:28.217279 systemd[1]: Reached target sockets.target. Dec 13 15:22:28.217630 systemd[1]: Reached target basic.target. Dec 13 15:22:28.218002 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:22:28.218032 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:22:28.219321 systemd[1]: Starting containerd.service... Dec 13 15:22:28.220851 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 15:22:28.222523 systemd[1]: Starting dbus.service... Dec 13 15:22:28.224951 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 15:22:28.228238 systemd[1]: Starting extend-filesystems.service... Dec 13 15:22:28.228747 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 15:22:28.231006 systemd[1]: Starting motdgen.service... Dec 13 15:22:28.232848 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 15:22:28.242571 jq[1176]: false Dec 13 15:22:28.254874 systemd[1]: Starting sshd-keygen.service... Dec 13 15:22:28.258362 systemd[1]: Starting systemd-logind.service... Dec 13 15:22:28.259045 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:22:28.259154 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 15:22:28.282115 jq[1189]: true Dec 13 15:22:28.259713 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 15:22:28.261745 systemd[1]: Starting update-engine.service... Dec 13 15:22:28.287802 jq[1191]: true Dec 13 15:22:28.264510 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 15:22:28.268559 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 15:22:28.268796 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 15:22:28.269253 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 15:22:28.269659 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 15:22:28.293520 systemd[1]: Started dbus.service. Dec 13 15:22:28.302748 extend-filesystems[1177]: Found loop1 Dec 13 15:22:28.302748 extend-filesystems[1177]: Found vda Dec 13 15:22:28.302748 extend-filesystems[1177]: Found vda1 Dec 13 15:22:28.302748 extend-filesystems[1177]: Found vda2 Dec 13 15:22:28.302748 extend-filesystems[1177]: Found vda3 Dec 13 15:22:28.302748 extend-filesystems[1177]: Found usr Dec 13 15:22:28.302748 extend-filesystems[1177]: Found vda4 Dec 13 15:22:28.302748 extend-filesystems[1177]: Found vda6 Dec 13 15:22:28.302748 extend-filesystems[1177]: Found vda7 Dec 13 15:22:28.302748 extend-filesystems[1177]: Found vda9 Dec 13 15:22:28.302748 extend-filesystems[1177]: Checking size of /dev/vda9 Dec 13 15:22:28.293326 dbus-daemon[1173]: [system] SELinux support is enabled Dec 13 15:22:28.296345 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 15:22:28.344770 extend-filesystems[1177]: Resized partition /dev/vda9 Dec 13 15:22:28.297738 dbus-daemon[1173]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1029 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 15:22:28.351131 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Dec 13 15:22:28.296371 systemd[1]: Reached target system-config.target. Dec 13 15:22:28.351314 extend-filesystems[1218]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 15:22:28.296805 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 15:22:28.296821 systemd[1]: Reached target user-config.target. Dec 13 15:22:28.301203 systemd[1]: Starting systemd-hostnamed.service... Dec 13 15:22:28.308514 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 15:22:28.308705 systemd[1]: Finished motdgen.service. Dec 13 15:22:28.358808 bash[1219]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:22:28.358252 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 15:22:28.386324 update_engine[1188]: I1213 15:22:28.385874 1188 main.cc:92] Flatcar Update Engine starting Dec 13 15:22:28.389295 systemd[1]: Started update-engine.service. Dec 13 15:22:28.394813 update_engine[1188]: I1213 15:22:28.389356 1188 update_check_scheduler.cc:74] Next update check in 3m36s Dec 13 15:22:28.391940 systemd[1]: Started locksmithd.service. Dec 13 15:22:28.417233 env[1197]: time="2024-12-13T15:22:28.417138568Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 15:22:28.436446 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Dec 13 15:22:28.445144 extend-filesystems[1218]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 15:22:28.445144 extend-filesystems[1218]: old_desc_blocks = 1, new_desc_blocks = 8 Dec 13 15:22:28.445144 extend-filesystems[1218]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Dec 13 15:22:28.447999 extend-filesystems[1177]: Resized filesystem in /dev/vda9 Dec 13 15:22:28.446476 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 15:22:28.446680 systemd[1]: Finished extend-filesystems.service. Dec 13 15:22:29.541174 systemd-resolved[1137]: Clock change detected. Flushing caches. Dec 13 15:22:29.541361 systemd-timesyncd[1138]: Contacted time server 152.67.150.30:123 (0.flatcar.pool.ntp.org). Dec 13 15:22:29.541411 systemd-timesyncd[1138]: Initial clock synchronization to Fri 2024-12-13 15:22:29.541123 UTC. Dec 13 15:22:29.545718 env[1197]: time="2024-12-13T15:22:29.545680305Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 15:22:29.546303 env[1197]: time="2024-12-13T15:22:29.546272750Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:22:29.548844 env[1197]: time="2024-12-13T15:22:29.548409708Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:22:29.548844 env[1197]: time="2024-12-13T15:22:29.548471563Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:22:29.548844 env[1197]: time="2024-12-13T15:22:29.548674462Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:22:29.548844 env[1197]: time="2024-12-13T15:22:29.548694005Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 15:22:29.548844 env[1197]: time="2024-12-13T15:22:29.548713937Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 15:22:29.548844 env[1197]: time="2024-12-13T15:22:29.548726651Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 15:22:29.548844 env[1197]: time="2024-12-13T15:22:29.548807734Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:22:29.549428 env[1197]: time="2024-12-13T15:22:29.549406156Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:22:29.549706 env[1197]: time="2024-12-13T15:22:29.549684673Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:22:29.549818 env[1197]: time="2024-12-13T15:22:29.549803494Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 15:22:29.550232 env[1197]: time="2024-12-13T15:22:29.550188273Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 15:22:29.550308 env[1197]: time="2024-12-13T15:22:29.550296016Z" level=info msg="metadata content store policy set" policy=shared Dec 13 15:22:29.554705 env[1197]: time="2024-12-13T15:22:29.554681015Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 15:22:29.554817 env[1197]: time="2024-12-13T15:22:29.554800926Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 15:22:29.554885 env[1197]: time="2024-12-13T15:22:29.554872561Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 15:22:29.554984 env[1197]: time="2024-12-13T15:22:29.554970395Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 15:22:29.555046 env[1197]: time="2024-12-13T15:22:29.555033706Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 15:22:29.555107 env[1197]: time="2024-12-13T15:22:29.555095046Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 15:22:29.555172 env[1197]: time="2024-12-13T15:22:29.555159671Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 15:22:29.555252 env[1197]: time="2024-12-13T15:22:29.555238911Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 15:22:29.555326 env[1197]: time="2024-12-13T15:22:29.555313242Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 15:22:29.555392 env[1197]: time="2024-12-13T15:22:29.555379703Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 15:22:29.555453 env[1197]: time="2024-12-13T15:22:29.555440414Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 15:22:29.555522 env[1197]: time="2024-12-13T15:22:29.555509752Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 15:22:29.555678 env[1197]: time="2024-12-13T15:22:29.555661946Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 15:22:29.555824 env[1197]: time="2024-12-13T15:22:29.555810734Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 15:22:29.556121 env[1197]: time="2024-12-13T15:22:29.556104791Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 15:22:29.556254 env[1197]: time="2024-12-13T15:22:29.556239473Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.558400 env[1197]: time="2024-12-13T15:22:29.558377898Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 15:22:29.558562 env[1197]: time="2024-12-13T15:22:29.558546001Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.558675 env[1197]: time="2024-12-13T15:22:29.558659865Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.558740 env[1197]: time="2024-12-13T15:22:29.558727629Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.559263 env[1197]: time="2024-12-13T15:22:29.559248380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.559331 env[1197]: time="2024-12-13T15:22:29.559318405Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.559402 env[1197]: time="2024-12-13T15:22:29.559389265Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.559465 env[1197]: time="2024-12-13T15:22:29.559453538Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.559533 env[1197]: time="2024-12-13T15:22:29.559520474Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.559606 env[1197]: time="2024-12-13T15:22:29.559593892Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 15:22:29.562378 env[1197]: time="2024-12-13T15:22:29.562356092Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.562481 env[1197]: time="2024-12-13T15:22:29.562466397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.562577 env[1197]: time="2024-12-13T15:22:29.562564328Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.562661 env[1197]: time="2024-12-13T15:22:29.562640641Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 15:22:29.562746 env[1197]: time="2024-12-13T15:22:29.562730794Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 15:22:29.562819 env[1197]: time="2024-12-13T15:22:29.562807249Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 15:22:29.562928 env[1197]: time="2024-12-13T15:22:29.562914650Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 15:22:29.563385 env[1197]: time="2024-12-13T15:22:29.563359859Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 15:22:29.563754 env[1197]: time="2024-12-13T15:22:29.563696881Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 15:22:29.565991 systemd-logind[1185]: Watching system buttons on /dev/input/event2 (Power Button) Dec 13 15:22:29.566326 env[1197]: time="2024-12-13T15:22:29.566306408Z" level=info msg="Connect containerd service" Dec 13 15:22:29.566465 env[1197]: time="2024-12-13T15:22:29.566444039Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 15:22:29.567427 env[1197]: time="2024-12-13T15:22:29.567403588Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:22:29.567542 systemd-logind[1185]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 15:22:29.570862 env[1197]: time="2024-12-13T15:22:29.570842216Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 15:22:29.571190 env[1197]: time="2024-12-13T15:22:29.571169244Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 15:22:29.572034 systemd[1]: Started containerd.service. Dec 13 15:22:29.572185 env[1197]: time="2024-12-13T15:22:29.572169418Z" level=info msg="containerd successfully booted in 0.064982s" Dec 13 15:22:29.572899 systemd-logind[1185]: New seat seat0. Dec 13 15:22:29.575158 env[1197]: time="2024-12-13T15:22:29.575117412Z" level=info msg="Start subscribing containerd event" Dec 13 15:22:29.577469 env[1197]: time="2024-12-13T15:22:29.577451321Z" level=info msg="Start recovering state" Dec 13 15:22:29.578500 env[1197]: time="2024-12-13T15:22:29.577817388Z" level=info msg="Start event monitor" Dec 13 15:22:29.577910 systemd[1]: Started systemd-logind.service. Dec 13 15:22:29.579039 env[1197]: time="2024-12-13T15:22:29.579014987Z" level=info msg="Start snapshots syncer" Dec 13 15:22:29.579138 env[1197]: time="2024-12-13T15:22:29.579123958Z" level=info msg="Start cni network conf syncer for default" Dec 13 15:22:29.579235 env[1197]: time="2024-12-13T15:22:29.579223214Z" level=info msg="Start streaming server" Dec 13 15:22:29.588403 dbus-daemon[1173]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 15:22:29.591211 systemd[1]: Started systemd-hostnamed.service. Dec 13 15:22:29.592430 systemd[1]: Created slice system-sshd.slice. Dec 13 15:22:29.596732 dbus-daemon[1173]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1203 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 15:22:29.599318 systemd[1]: Starting polkit.service... Dec 13 15:22:29.614683 polkitd[1233]: Started polkitd version 121 Dec 13 15:22:29.628682 polkitd[1233]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 15:22:29.628930 polkitd[1233]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 15:22:29.630316 polkitd[1233]: Finished loading, compiling and executing 2 rules Dec 13 15:22:29.630816 dbus-daemon[1173]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 15:22:29.631669 polkitd[1233]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 15:22:29.630977 systemd[1]: Started polkit.service. Dec 13 15:22:29.645042 systemd-hostnamed[1203]: Hostname set to (static) Dec 13 15:22:29.660668 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:22:29.660867 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:22:29.683955 locksmithd[1226]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 15:22:30.029533 sshd_keygen[1224]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 15:22:30.059295 systemd[1]: Finished sshd-keygen.service. Dec 13 15:22:30.064490 systemd[1]: Starting issuegen.service... Dec 13 15:22:30.068867 systemd[1]: Started sshd@0-10.244.97.150:22-139.178.68.195:40664.service. Dec 13 15:22:30.078309 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 15:22:30.078560 systemd[1]: Finished issuegen.service. Dec 13 15:22:30.088289 systemd[1]: Starting systemd-user-sessions.service... Dec 13 15:22:30.098765 systemd[1]: Finished systemd-user-sessions.service. Dec 13 15:22:30.100713 systemd[1]: Started getty@tty1.service. Dec 13 15:22:30.103682 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 15:22:30.104317 systemd[1]: Reached target getty.target. Dec 13 15:22:30.164397 systemd-networkd[1029]: eth0: Gained IPv6LL Dec 13 15:22:30.169358 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 15:22:30.170979 systemd[1]: Reached target network-online.target. Dec 13 15:22:30.174600 systemd[1]: Starting kubelet.service... Dec 13 15:22:30.981078 sshd[1253]: Accepted publickey for core from 139.178.68.195 port 40664 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:22:30.984508 sshd[1253]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:22:31.001865 systemd[1]: Created slice user-500.slice. Dec 13 15:22:31.003700 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 15:22:31.009289 systemd-logind[1185]: New session 1 of user core. Dec 13 15:22:31.015330 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 15:22:31.018726 systemd[1]: Starting user@500.service... Dec 13 15:22:31.022983 (systemd)[1264]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:22:31.099925 systemd[1264]: Queued start job for default target default.target. Dec 13 15:22:31.100916 systemd[1264]: Reached target paths.target. Dec 13 15:22:31.100940 systemd[1264]: Reached target sockets.target. Dec 13 15:22:31.100954 systemd[1264]: Reached target timers.target. Dec 13 15:22:31.100967 systemd[1264]: Reached target basic.target. Dec 13 15:22:31.101074 systemd[1]: Started user@500.service. Dec 13 15:22:31.102624 systemd[1]: Started session-1.scope. Dec 13 15:22:31.103762 systemd[1264]: Reached target default.target. Dec 13 15:22:31.103903 systemd[1264]: Startup finished in 71ms. Dec 13 15:22:31.122563 systemd[1]: Started kubelet.service. Dec 13 15:22:31.679490 systemd-networkd[1029]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:1865:24:19ff:fef4:6196/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:1865:24:19ff:fef4:6196/64 assigned by NDisc. Dec 13 15:22:31.679524 systemd-networkd[1029]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 15:22:31.744471 systemd[1]: Started sshd@1-10.244.97.150:22-139.178.68.195:40672.service. Dec 13 15:22:31.862389 kubelet[1273]: E1213 15:22:31.862319 1273 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:22:31.864871 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:22:31.865034 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:22:31.865399 systemd[1]: kubelet.service: Consumed 1.285s CPU time. Dec 13 15:22:32.644329 sshd[1282]: Accepted publickey for core from 139.178.68.195 port 40672 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:22:32.648325 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:22:32.656868 systemd[1]: Started session-2.scope. Dec 13 15:22:32.660166 systemd-logind[1185]: New session 2 of user core. Dec 13 15:22:33.272728 sshd[1282]: pam_unix(sshd:session): session closed for user core Dec 13 15:22:33.277661 systemd-logind[1185]: Session 2 logged out. Waiting for processes to exit. Dec 13 15:22:33.278919 systemd[1]: sshd@1-10.244.97.150:22-139.178.68.195:40672.service: Deactivated successfully. Dec 13 15:22:33.280319 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 15:22:33.281512 systemd-logind[1185]: Removed session 2. Dec 13 15:22:33.418789 systemd[1]: Started sshd@2-10.244.97.150:22-139.178.68.195:40684.service. Dec 13 15:22:34.316510 sshd[1289]: Accepted publickey for core from 139.178.68.195 port 40684 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:22:34.320884 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:22:34.331815 systemd[1]: Started session-3.scope. Dec 13 15:22:34.333234 systemd-logind[1185]: New session 3 of user core. Dec 13 15:22:34.947511 sshd[1289]: pam_unix(sshd:session): session closed for user core Dec 13 15:22:34.954717 systemd-logind[1185]: Session 3 logged out. Waiting for processes to exit. Dec 13 15:22:34.955329 systemd[1]: sshd@2-10.244.97.150:22-139.178.68.195:40684.service: Deactivated successfully. Dec 13 15:22:34.956591 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 15:22:34.957902 systemd-logind[1185]: Removed session 3. Dec 13 15:22:36.447116 coreos-metadata[1172]: Dec 13 15:22:36.446 WARN failed to locate config-drive, using the metadata service API instead Dec 13 15:22:36.492341 coreos-metadata[1172]: Dec 13 15:22:36.492 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 15:22:36.526710 coreos-metadata[1172]: Dec 13 15:22:36.526 INFO Fetch successful Dec 13 15:22:36.526948 coreos-metadata[1172]: Dec 13 15:22:36.526 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 15:22:36.563093 coreos-metadata[1172]: Dec 13 15:22:36.563 INFO Fetch successful Dec 13 15:22:36.565537 unknown[1172]: wrote ssh authorized keys file for user: core Dec 13 15:22:36.579852 update-ssh-keys[1296]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:22:36.581546 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 15:22:36.582700 systemd[1]: Reached target multi-user.target. Dec 13 15:22:36.586685 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 15:22:36.603357 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 15:22:36.603762 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 15:22:36.604624 systemd[1]: Startup finished in 958ms (kernel) + 8.541s (initrd) + 12.277s (userspace) = 21.777s. Dec 13 15:22:42.116865 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 15:22:42.118065 systemd[1]: Stopped kubelet.service. Dec 13 15:22:42.118181 systemd[1]: kubelet.service: Consumed 1.285s CPU time. Dec 13 15:22:42.121710 systemd[1]: Starting kubelet.service... Dec 13 15:22:42.229817 systemd[1]: Started kubelet.service. Dec 13 15:22:42.290388 kubelet[1302]: E1213 15:22:42.290319 1302 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:22:42.299415 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:22:42.299568 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:22:45.098246 systemd[1]: Started sshd@3-10.244.97.150:22-139.178.68.195:40242.service. Dec 13 15:22:45.986119 sshd[1309]: Accepted publickey for core from 139.178.68.195 port 40242 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:22:45.991295 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:22:46.000991 systemd-logind[1185]: New session 4 of user core. Dec 13 15:22:46.001600 systemd[1]: Started session-4.scope. Dec 13 15:22:46.616353 sshd[1309]: pam_unix(sshd:session): session closed for user core Dec 13 15:22:46.623770 systemd-logind[1185]: Session 4 logged out. Waiting for processes to exit. Dec 13 15:22:46.624388 systemd[1]: sshd@3-10.244.97.150:22-139.178.68.195:40242.service: Deactivated successfully. Dec 13 15:22:46.625926 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 15:22:46.627501 systemd-logind[1185]: Removed session 4. Dec 13 15:22:46.760825 systemd[1]: Started sshd@4-10.244.97.150:22-139.178.68.195:56764.service. Dec 13 15:22:47.648407 sshd[1315]: Accepted publickey for core from 139.178.68.195 port 56764 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:22:47.650574 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:22:47.658598 systemd-logind[1185]: New session 5 of user core. Dec 13 15:22:47.660509 systemd[1]: Started session-5.scope. Dec 13 15:22:48.259292 sshd[1315]: pam_unix(sshd:session): session closed for user core Dec 13 15:22:48.265710 systemd[1]: sshd@4-10.244.97.150:22-139.178.68.195:56764.service: Deactivated successfully. Dec 13 15:22:48.266955 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 15:22:48.268075 systemd-logind[1185]: Session 5 logged out. Waiting for processes to exit. Dec 13 15:22:48.269763 systemd-logind[1185]: Removed session 5. Dec 13 15:22:48.407223 systemd[1]: Started sshd@5-10.244.97.150:22-139.178.68.195:56768.service. Dec 13 15:22:49.309018 sshd[1321]: Accepted publickey for core from 139.178.68.195 port 56768 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:22:49.313365 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:22:49.323323 systemd-logind[1185]: New session 6 of user core. Dec 13 15:22:49.324457 systemd[1]: Started session-6.scope. Dec 13 15:22:49.934267 sshd[1321]: pam_unix(sshd:session): session closed for user core Dec 13 15:22:49.939689 systemd[1]: sshd@5-10.244.97.150:22-139.178.68.195:56768.service: Deactivated successfully. Dec 13 15:22:49.940407 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 15:22:49.941523 systemd-logind[1185]: Session 6 logged out. Waiting for processes to exit. Dec 13 15:22:49.942785 systemd-logind[1185]: Removed session 6. Dec 13 15:22:50.086065 systemd[1]: Started sshd@6-10.244.97.150:22-139.178.68.195:56778.service. Dec 13 15:22:50.989736 sshd[1327]: Accepted publickey for core from 139.178.68.195 port 56778 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:22:50.993986 sshd[1327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:22:51.006147 systemd-logind[1185]: New session 7 of user core. Dec 13 15:22:51.009540 systemd[1]: Started session-7.scope. Dec 13 15:22:51.482070 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 15:22:51.482731 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:22:51.492640 dbus-daemon[1173]: н\xec\xcevU: received setenforce notice (enforcing=1048058336) Dec 13 15:22:51.494588 sudo[1330]: pam_unix(sudo:session): session closed for user root Dec 13 15:22:51.640491 sshd[1327]: pam_unix(sshd:session): session closed for user core Dec 13 15:22:51.646281 systemd-logind[1185]: Session 7 logged out. Waiting for processes to exit. Dec 13 15:22:51.647110 systemd[1]: sshd@6-10.244.97.150:22-139.178.68.195:56778.service: Deactivated successfully. Dec 13 15:22:51.648512 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 15:22:51.649726 systemd-logind[1185]: Removed session 7. Dec 13 15:22:51.786346 systemd[1]: Started sshd@7-10.244.97.150:22-139.178.68.195:56786.service. Dec 13 15:22:52.416743 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 15:22:52.417233 systemd[1]: Stopped kubelet.service. Dec 13 15:22:52.420715 systemd[1]: Starting kubelet.service... Dec 13 15:22:52.517174 systemd[1]: Started kubelet.service. Dec 13 15:22:52.573226 kubelet[1340]: E1213 15:22:52.573174 1340 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:22:52.576441 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:22:52.576683 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:22:52.678100 sshd[1334]: Accepted publickey for core from 139.178.68.195 port 56786 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:22:52.682137 sshd[1334]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:22:52.691669 systemd-logind[1185]: New session 8 of user core. Dec 13 15:22:52.692769 systemd[1]: Started session-8.scope. Dec 13 15:22:53.163532 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 15:22:53.165058 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:22:53.170007 sudo[1349]: pam_unix(sudo:session): session closed for user root Dec 13 15:22:53.179016 sudo[1348]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 15:22:53.179375 sudo[1348]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:22:53.190707 systemd[1]: Stopping audit-rules.service... Dec 13 15:22:53.191000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:22:53.195175 auditctl[1352]: No rules Dec 13 15:22:53.195856 kernel: kauditd_printk_skb: 37 callbacks suppressed Dec 13 15:22:53.195929 kernel: audit: type=1305 audit(1734103373.191:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:22:53.202828 kernel: audit: type=1300 audit(1734103373.191:211): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc442d06f0 a2=420 a3=0 items=0 ppid=1 pid=1352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:53.191000 audit[1352]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc442d06f0 a2=420 a3=0 items=0 ppid=1 pid=1352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:53.196350 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 15:22:53.196537 systemd[1]: Stopped audit-rules.service. Dec 13 15:22:53.198676 systemd[1]: Starting audit-rules.service... Dec 13 15:22:53.191000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:22:53.205656 kernel: audit: type=1327 audit(1734103373.191:211): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:22:53.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:53.212235 kernel: audit: type=1131 audit(1734103373.196:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:53.220805 augenrules[1369]: No rules Dec 13 15:22:53.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:53.221594 systemd[1]: Finished audit-rules.service. Dec 13 15:22:53.224980 sudo[1348]: pam_unix(sudo:session): session closed for user root Dec 13 15:22:53.225233 kernel: audit: type=1130 audit(1734103373.221:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:53.224000 audit[1348]: USER_END pid=1348 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:22:53.224000 audit[1348]: CRED_DISP pid=1348 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:22:53.232828 kernel: audit: type=1106 audit(1734103373.224:214): pid=1348 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:22:53.232874 kernel: audit: type=1104 audit(1734103373.224:215): pid=1348 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:22:53.370331 sshd[1334]: pam_unix(sshd:session): session closed for user core Dec 13 15:22:53.372000 audit[1334]: USER_END pid=1334 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:22:53.376527 systemd[1]: sshd@7-10.244.97.150:22-139.178.68.195:56786.service: Deactivated successfully. Dec 13 15:22:53.377691 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 15:22:53.383277 kernel: audit: type=1106 audit(1734103373.372:216): pid=1334 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:22:53.383411 kernel: audit: type=1104 audit(1734103373.373:217): pid=1334 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:22:53.373000 audit[1334]: CRED_DISP pid=1334 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:22:53.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.97.150:22-139.178.68.195:56786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:53.388017 systemd-logind[1185]: Session 8 logged out. Waiting for processes to exit. Dec 13 15:22:53.391096 kernel: audit: type=1131 audit(1734103373.376:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.97.150:22-139.178.68.195:56786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:53.391799 systemd-logind[1185]: Removed session 8. Dec 13 15:22:53.520160 systemd[1]: Started sshd@8-10.244.97.150:22-139.178.68.195:56798.service. Dec 13 15:22:53.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.97.150:22-139.178.68.195:56798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:54.423000 audit[1375]: USER_ACCT pid=1375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:22:54.423941 sshd[1375]: Accepted publickey for core from 139.178.68.195 port 56798 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:22:54.426000 audit[1375]: CRED_ACQ pid=1375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:22:54.426000 audit[1375]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3449bab0 a2=3 a3=0 items=0 ppid=1 pid=1375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:54.426000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:22:54.428347 sshd[1375]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:22:54.435667 systemd[1]: Started session-9.scope. Dec 13 15:22:54.436389 systemd-logind[1185]: New session 9 of user core. Dec 13 15:22:54.441000 audit[1375]: USER_START pid=1375 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:22:54.443000 audit[1377]: CRED_ACQ pid=1377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:22:54.903000 audit[1378]: USER_ACCT pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:22:54.904452 sudo[1378]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 15:22:54.904000 audit[1378]: CRED_REFR pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:22:54.905646 sudo[1378]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:22:54.908000 audit[1378]: USER_START pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:22:54.929547 systemd[1]: Starting coreos-metadata.service... Dec 13 15:23:01.724318 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 15:23:01.733643 kernel: kauditd_printk_skb: 11 callbacks suppressed Dec 13 15:23:01.733811 kernel: audit: type=1131 audit(1734103381.724:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:01.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:01.747000 audit: BPF prog-id=43 op=UNLOAD Dec 13 15:23:01.747000 audit: BPF prog-id=42 op=UNLOAD Dec 13 15:23:01.749695 kernel: audit: type=1334 audit(1734103381.747:229): prog-id=43 op=UNLOAD Dec 13 15:23:01.749767 kernel: audit: type=1334 audit(1734103381.747:230): prog-id=42 op=UNLOAD Dec 13 15:23:01.749800 kernel: audit: type=1334 audit(1734103381.747:231): prog-id=41 op=UNLOAD Dec 13 15:23:01.747000 audit: BPF prog-id=41 op=UNLOAD Dec 13 15:23:01.997944 coreos-metadata[1382]: Dec 13 15:23:01.996 WARN failed to locate config-drive, using the metadata service API instead Dec 13 15:23:02.048420 coreos-metadata[1382]: Dec 13 15:23:02.047 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 15:23:02.050769 coreos-metadata[1382]: Dec 13 15:23:02.050 INFO Fetch successful Dec 13 15:23:02.050967 coreos-metadata[1382]: Dec 13 15:23:02.050 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Dec 13 15:23:02.066296 coreos-metadata[1382]: Dec 13 15:23:02.065 INFO Fetch successful Dec 13 15:23:02.066807 coreos-metadata[1382]: Dec 13 15:23:02.066 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Dec 13 15:23:02.083698 coreos-metadata[1382]: Dec 13 15:23:02.083 INFO Fetch successful Dec 13 15:23:02.084171 coreos-metadata[1382]: Dec 13 15:23:02.083 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Dec 13 15:23:02.102687 coreos-metadata[1382]: Dec 13 15:23:02.102 INFO Fetch successful Dec 13 15:23:02.103184 coreos-metadata[1382]: Dec 13 15:23:02.102 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Dec 13 15:23:02.117680 coreos-metadata[1382]: Dec 13 15:23:02.117 INFO Fetch successful Dec 13 15:23:02.134304 systemd[1]: Finished coreos-metadata.service. Dec 13 15:23:02.140504 kernel: audit: type=1130 audit(1734103382.134:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:02.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:02.666623 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 15:23:02.667058 systemd[1]: Stopped kubelet.service. Dec 13 15:23:02.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:02.681066 kernel: audit: type=1130 audit(1734103382.665:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:02.681699 systemd[1]: Starting kubelet.service... Dec 13 15:23:02.690502 kernel: audit: type=1131 audit(1734103382.665:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:02.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:02.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:02.784059 systemd[1]: Started kubelet.service. Dec 13 15:23:02.792249 kernel: audit: type=1130 audit(1734103382.783:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:02.850353 kubelet[1413]: E1213 15:23:02.850310 1413 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:23:02.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:23:02.852254 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:23:02.852399 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:23:02.856395 kernel: audit: type=1131 audit(1734103382.851:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:23:03.088934 systemd[1]: Stopped kubelet.service. Dec 13 15:23:03.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:03.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:03.103428 kernel: audit: type=1130 audit(1734103383.089:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:03.102574 systemd[1]: Starting kubelet.service... Dec 13 15:23:03.125077 systemd[1]: Reloading. Dec 13 15:23:03.233823 /usr/lib/systemd/system-generators/torcx-generator[1456]: time="2024-12-13T15:23:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:23:03.233854 /usr/lib/systemd/system-generators/torcx-generator[1456]: time="2024-12-13T15:23:03Z" level=info msg="torcx already run" Dec 13 15:23:03.318940 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:23:03.319120 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:23:03.338883 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:23:03.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.411000 audit: BPF prog-id=46 op=LOAD Dec 13 15:23:03.411000 audit: BPF prog-id=27 op=UNLOAD Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit: BPF prog-id=47 op=LOAD Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.412000 audit: BPF prog-id=48 op=LOAD Dec 13 15:23:03.413000 audit: BPF prog-id=28 op=UNLOAD Dec 13 15:23:03.413000 audit: BPF prog-id=29 op=UNLOAD Dec 13 15:23:03.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.415000 audit: BPF prog-id=49 op=LOAD Dec 13 15:23:03.416000 audit: BPF prog-id=36 op=UNLOAD Dec 13 15:23:03.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.417000 audit: BPF prog-id=50 op=LOAD Dec 13 15:23:03.417000 audit: BPF prog-id=44 op=UNLOAD Dec 13 15:23:03.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.419000 audit: BPF prog-id=51 op=LOAD Dec 13 15:23:03.419000 audit: BPF prog-id=37 op=UNLOAD Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit: BPF prog-id=52 op=LOAD Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.421000 audit: BPF prog-id=53 op=LOAD Dec 13 15:23:03.421000 audit: BPF prog-id=30 op=UNLOAD Dec 13 15:23:03.421000 audit: BPF prog-id=31 op=UNLOAD Dec 13 15:23:03.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit: BPF prog-id=54 op=LOAD Dec 13 15:23:03.422000 audit: BPF prog-id=32 op=UNLOAD Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit: BPF prog-id=55 op=LOAD Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.423000 audit: BPF prog-id=56 op=LOAD Dec 13 15:23:03.423000 audit: BPF prog-id=33 op=UNLOAD Dec 13 15:23:03.423000 audit: BPF prog-id=34 op=UNLOAD Dec 13 15:23:03.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.425000 audit: BPF prog-id=57 op=LOAD Dec 13 15:23:03.425000 audit: BPF prog-id=38 op=UNLOAD Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit: BPF prog-id=58 op=LOAD Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.426000 audit: BPF prog-id=59 op=LOAD Dec 13 15:23:03.426000 audit: BPF prog-id=39 op=UNLOAD Dec 13 15:23:03.427000 audit: BPF prog-id=40 op=UNLOAD Dec 13 15:23:03.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:03.428000 audit: BPF prog-id=60 op=LOAD Dec 13 15:23:03.428000 audit: BPF prog-id=35 op=UNLOAD Dec 13 15:23:03.446733 systemd[1]: Started kubelet.service. Dec 13 15:23:03.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:03.456907 systemd[1]: Stopping kubelet.service... Dec 13 15:23:03.458307 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 15:23:03.458536 systemd[1]: Stopped kubelet.service. Dec 13 15:23:03.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:03.460558 systemd[1]: Starting kubelet.service... Dec 13 15:23:03.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:03.550715 systemd[1]: Started kubelet.service. Dec 13 15:23:03.616723 kubelet[1514]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:23:03.616723 kubelet[1514]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:23:03.616723 kubelet[1514]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:23:03.617134 kubelet[1514]: I1213 15:23:03.616964 1514 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:23:04.008737 kubelet[1514]: I1213 15:23:04.008677 1514 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 15:23:04.009066 kubelet[1514]: I1213 15:23:04.009037 1514 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:23:04.009670 kubelet[1514]: I1213 15:23:04.009638 1514 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 15:23:04.043187 kubelet[1514]: I1213 15:23:04.043133 1514 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:23:04.056462 kubelet[1514]: I1213 15:23:04.056426 1514 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:23:04.058781 kubelet[1514]: I1213 15:23:04.058711 1514 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:23:04.058958 kubelet[1514]: I1213 15:23:04.058780 1514 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.244.97.150","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:23:04.059578 kubelet[1514]: I1213 15:23:04.059554 1514 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:23:04.059578 kubelet[1514]: I1213 15:23:04.059575 1514 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:23:04.059732 kubelet[1514]: I1213 15:23:04.059715 1514 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:23:04.060700 kubelet[1514]: I1213 15:23:04.060681 1514 kubelet.go:400] "Attempting to sync node with API server" Dec 13 15:23:04.060756 kubelet[1514]: I1213 15:23:04.060702 1514 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:23:04.060756 kubelet[1514]: I1213 15:23:04.060741 1514 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:23:04.060819 kubelet[1514]: I1213 15:23:04.060764 1514 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:23:04.069545 kubelet[1514]: E1213 15:23:04.069506 1514 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:04.070833 kubelet[1514]: E1213 15:23:04.070799 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:04.075659 kubelet[1514]: I1213 15:23:04.075633 1514 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:23:04.078473 kubelet[1514]: I1213 15:23:04.078436 1514 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:23:04.078589 kubelet[1514]: W1213 15:23:04.078537 1514 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 15:23:04.079423 kubelet[1514]: I1213 15:23:04.079403 1514 server.go:1264] "Started kubelet" Dec 13 15:23:04.079615 kubelet[1514]: I1213 15:23:04.079580 1514 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:23:04.080746 kubelet[1514]: I1213 15:23:04.080730 1514 server.go:455] "Adding debug handlers to kubelet server" Dec 13 15:23:04.086404 kubelet[1514]: I1213 15:23:04.086350 1514 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:23:04.086632 kubelet[1514]: I1213 15:23:04.086617 1514 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:23:04.086977 kubelet[1514]: W1213 15:23:04.086961 1514 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.244.97.150" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 15:23:04.087031 kubelet[1514]: E1213 15:23:04.087002 1514 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.244.97.150" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 15:23:04.087122 kubelet[1514]: W1213 15:23:04.087108 1514 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 15:23:04.087160 kubelet[1514]: E1213 15:23:04.087126 1514 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 15:23:04.087000 audit[1514]: AVC avc: denied { mac_admin } for pid=1514 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:04.087000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:23:04.087000 audit[1514]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009fd8c0 a1=c0005676b0 a2=c0009fd890 a3=25 items=0 ppid=1 pid=1514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.087000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:23:04.089719 kubelet[1514]: I1213 15:23:04.089697 1514 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:23:04.088000 audit[1514]: AVC avc: denied { mac_admin } for pid=1514 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:04.088000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:23:04.088000 audit[1514]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009f1960 a1=c0005676c8 a2=c0009fd950 a3=25 items=0 ppid=1 pid=1514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.088000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:23:04.090082 kubelet[1514]: I1213 15:23:04.090067 1514 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:23:04.090260 kubelet[1514]: I1213 15:23:04.090248 1514 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:23:04.098348 kubelet[1514]: E1213 15:23:04.098207 1514 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.97.150.1810c5d713da9d89 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.97.150,UID:10.244.97.150,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.244.97.150,},FirstTimestamp:2024-12-13 15:23:04.079375753 +0000 UTC m=+0.521799021,LastTimestamp:2024-12-13 15:23:04.079375753 +0000 UTC m=+0.521799021,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.97.150,}" Dec 13 15:23:04.098743 kubelet[1514]: E1213 15:23:04.098727 1514 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 15:23:04.099755 kubelet[1514]: E1213 15:23:04.099742 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:04.099815 kubelet[1514]: I1213 15:23:04.099800 1514 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:23:04.099943 kubelet[1514]: I1213 15:23:04.099932 1514 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 15:23:04.100028 kubelet[1514]: I1213 15:23:04.100018 1514 reconciler.go:26] "Reconciler: start to sync state" Dec 13 15:23:04.101508 kubelet[1514]: I1213 15:23:04.101479 1514 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:23:04.102225 kubelet[1514]: I1213 15:23:04.101641 1514 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:23:04.104224 kubelet[1514]: I1213 15:23:04.103081 1514 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:23:04.119605 kubelet[1514]: E1213 15:23:04.119577 1514 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.244.97.150\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 15:23:04.124845 kubelet[1514]: I1213 15:23:04.124818 1514 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:23:04.124845 kubelet[1514]: I1213 15:23:04.124841 1514 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:23:04.124994 kubelet[1514]: I1213 15:23:04.124878 1514 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:23:04.128141 kubelet[1514]: I1213 15:23:04.128118 1514 policy_none.go:49] "None policy: Start" Dec 13 15:23:04.129578 kubelet[1514]: I1213 15:23:04.129556 1514 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:23:04.129652 kubelet[1514]: I1213 15:23:04.129589 1514 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:23:04.134294 systemd[1]: Created slice kubepods.slice. Dec 13 15:23:04.142094 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 15:23:04.148068 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 15:23:04.151000 audit[1527]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:04.151000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe08274fa0 a2=0 a3=7ffe08274f8c items=0 ppid=1514 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:23:04.153000 audit[1531]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:04.153000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff56f35c90 a2=0 a3=7fff56f35c7c items=0 ppid=1514 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:23:04.157034 kubelet[1514]: I1213 15:23:04.157016 1514 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:23:04.155000 audit[1514]: AVC avc: denied { mac_admin } for pid=1514 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:04.155000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:23:04.155000 audit[1514]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d72270 a1=c000d56fd8 a2=c000d72240 a3=25 items=0 ppid=1 pid=1514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.155000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:23:04.158893 kubelet[1514]: I1213 15:23:04.158874 1514 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:23:04.159703 kubelet[1514]: I1213 15:23:04.159662 1514 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 15:23:04.159938 kubelet[1514]: I1213 15:23:04.159929 1514 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:23:04.160855 kubelet[1514]: E1213 15:23:04.160837 1514 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.244.97.150\" not found" Dec 13 15:23:04.155000 audit[1533]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:04.155000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd04934290 a2=0 a3=7ffd0493427c items=0 ppid=1514 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:23:04.173000 audit[1538]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:04.173000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff014a2530 a2=0 a3=7fff014a251c items=0 ppid=1514 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:23:04.201970 kubelet[1514]: I1213 15:23:04.201905 1514 kubelet_node_status.go:73] "Attempting to register node" node="10.244.97.150" Dec 13 15:23:04.223887 kubelet[1514]: I1213 15:23:04.223794 1514 kubelet_node_status.go:76] "Successfully registered node" node="10.244.97.150" Dec 13 15:23:04.234000 audit[1543]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:04.234000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff92b8d6d0 a2=0 a3=7fff92b8d6bc items=0 ppid=1514 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 15:23:04.236677 kubelet[1514]: I1213 15:23:04.236626 1514 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:23:04.236000 audit[1544]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:04.236000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1d3ce8b0 a2=0 a3=7fff1d3ce89c items=0 ppid=1514 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.236000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:23:04.238757 kubelet[1514]: E1213 15:23:04.238721 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:04.238000 audit[1546]: NETFILTER_CFG table=nat:8 family=2 entries=2 op=nft_register_chain pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:04.238000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd2bae5960 a2=0 a3=7ffd2bae594c items=0 ppid=1514 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:23:04.239000 audit[1545]: NETFILTER_CFG table=mangle:9 family=10 entries=2 op=nft_register_chain pid=1545 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:04.239000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd007483d0 a2=0 a3=7ffd007483bc items=0 ppid=1514 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:23:04.240818 kubelet[1514]: I1213 15:23:04.240800 1514 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:23:04.240864 kubelet[1514]: I1213 15:23:04.240838 1514 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:23:04.240864 kubelet[1514]: I1213 15:23:04.240860 1514 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 15:23:04.240922 kubelet[1514]: E1213 15:23:04.240902 1514 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 15:23:04.240000 audit[1547]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1547 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:04.240000 audit[1547]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde308b1d0 a2=0 a3=7ffde308b1bc items=0 ppid=1514 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:23:04.241000 audit[1548]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1548 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:04.241000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcaff64f70 a2=0 a3=7ffcaff64f5c items=0 ppid=1514 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:23:04.243000 audit[1549]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1549 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:04.243000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffca5e266f0 a2=0 a3=7ffca5e266dc items=0 ppid=1514 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:23:04.244000 audit[1550]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1550 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:04.244000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffb75c7890 a2=0 a3=7fffb75c787c items=0 ppid=1514 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:04.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:23:04.339523 kubelet[1514]: E1213 15:23:04.339310 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:04.440071 kubelet[1514]: E1213 15:23:04.439926 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:04.540891 kubelet[1514]: E1213 15:23:04.540812 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:04.580974 sudo[1378]: pam_unix(sudo:session): session closed for user root Dec 13 15:23:04.579000 audit[1378]: USER_END pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:23:04.580000 audit[1378]: CRED_DISP pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:23:04.641666 kubelet[1514]: E1213 15:23:04.641396 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:04.727726 sshd[1375]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:04.728000 audit[1375]: USER_END pid=1375 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:04.728000 audit[1375]: CRED_DISP pid=1375 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:04.732020 systemd-logind[1185]: Session 9 logged out. Waiting for processes to exit. Dec 13 15:23:04.732697 systemd[1]: sshd@8-10.244.97.150:22-139.178.68.195:56798.service: Deactivated successfully. Dec 13 15:23:04.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.97.150:22-139.178.68.195:56798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:04.734286 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 15:23:04.736615 systemd-logind[1185]: Removed session 9. Dec 13 15:23:04.742341 kubelet[1514]: E1213 15:23:04.742284 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:04.843661 kubelet[1514]: E1213 15:23:04.843588 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:04.945078 kubelet[1514]: E1213 15:23:04.945025 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:05.012964 kubelet[1514]: I1213 15:23:05.012830 1514 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 15:23:05.013289 kubelet[1514]: W1213 15:23:05.013182 1514 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 15:23:05.013289 kubelet[1514]: W1213 15:23:05.013280 1514 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 15:23:05.046024 kubelet[1514]: E1213 15:23:05.045920 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:05.071405 kubelet[1514]: E1213 15:23:05.071327 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:05.146732 kubelet[1514]: E1213 15:23:05.146662 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:05.248807 kubelet[1514]: E1213 15:23:05.248007 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:05.348966 kubelet[1514]: E1213 15:23:05.348878 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:05.450083 kubelet[1514]: E1213 15:23:05.449991 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:05.550548 kubelet[1514]: E1213 15:23:05.550282 1514 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.244.97.150\" not found" Dec 13 15:23:05.651669 kubelet[1514]: I1213 15:23:05.651633 1514 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 15:23:05.654053 env[1197]: time="2024-12-13T15:23:05.653896704Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 15:23:05.654525 kubelet[1514]: I1213 15:23:05.654493 1514 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 15:23:06.072420 kubelet[1514]: E1213 15:23:06.072331 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:06.072693 kubelet[1514]: I1213 15:23:06.072442 1514 apiserver.go:52] "Watching apiserver" Dec 13 15:23:06.082925 kubelet[1514]: I1213 15:23:06.081149 1514 topology_manager.go:215] "Topology Admit Handler" podUID="02b49a98-eb43-4b18-9c64-e40b03a5001f" podNamespace="calico-system" podName="calico-node-5wz6p" Dec 13 15:23:06.082925 kubelet[1514]: I1213 15:23:06.081385 1514 topology_manager.go:215] "Topology Admit Handler" podUID="ef1b7ee7-8a52-46a6-99ac-df9c05563ef4" podNamespace="calico-system" podName="csi-node-driver-ttxwp" Dec 13 15:23:06.082925 kubelet[1514]: I1213 15:23:06.081589 1514 topology_manager.go:215] "Topology Admit Handler" podUID="747f2d7f-d2f3-4eda-b93d-fadeec2de8fa" podNamespace="kube-system" podName="kube-proxy-c4k4x" Dec 13 15:23:06.082925 kubelet[1514]: E1213 15:23:06.082531 1514 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttxwp" podUID="ef1b7ee7-8a52-46a6-99ac-df9c05563ef4" Dec 13 15:23:06.090863 systemd[1]: Created slice kubepods-besteffort-pod02b49a98_eb43_4b18_9c64_e40b03a5001f.slice. Dec 13 15:23:06.102717 kubelet[1514]: I1213 15:23:06.102686 1514 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 15:23:06.105925 systemd[1]: Created slice kubepods-besteffort-pod747f2d7f_d2f3_4eda_b93d_fadeec2de8fa.slice. Dec 13 15:23:06.112070 kubelet[1514]: I1213 15:23:06.112034 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/02b49a98-eb43-4b18-9c64-e40b03a5001f-policysync\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.112070 kubelet[1514]: I1213 15:23:06.112070 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/02b49a98-eb43-4b18-9c64-e40b03a5001f-var-run-calico\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.112226 kubelet[1514]: I1213 15:23:06.112090 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/02b49a98-eb43-4b18-9c64-e40b03a5001f-cni-net-dir\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.112226 kubelet[1514]: I1213 15:23:06.112107 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ef1b7ee7-8a52-46a6-99ac-df9c05563ef4-kubelet-dir\") pod \"csi-node-driver-ttxwp\" (UID: \"ef1b7ee7-8a52-46a6-99ac-df9c05563ef4\") " pod="calico-system/csi-node-driver-ttxwp" Dec 13 15:23:06.112226 kubelet[1514]: I1213 15:23:06.112123 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/747f2d7f-d2f3-4eda-b93d-fadeec2de8fa-xtables-lock\") pod \"kube-proxy-c4k4x\" (UID: \"747f2d7f-d2f3-4eda-b93d-fadeec2de8fa\") " pod="kube-system/kube-proxy-c4k4x" Dec 13 15:23:06.112226 kubelet[1514]: I1213 15:23:06.112138 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/02b49a98-eb43-4b18-9c64-e40b03a5001f-lib-modules\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.112226 kubelet[1514]: I1213 15:23:06.112154 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/02b49a98-eb43-4b18-9c64-e40b03a5001f-tigera-ca-bundle\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.112368 kubelet[1514]: I1213 15:23:06.112169 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/02b49a98-eb43-4b18-9c64-e40b03a5001f-node-certs\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.112368 kubelet[1514]: I1213 15:23:06.112185 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/02b49a98-eb43-4b18-9c64-e40b03a5001f-cni-log-dir\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.112368 kubelet[1514]: I1213 15:23:06.112219 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ef1b7ee7-8a52-46a6-99ac-df9c05563ef4-socket-dir\") pod \"csi-node-driver-ttxwp\" (UID: \"ef1b7ee7-8a52-46a6-99ac-df9c05563ef4\") " pod="calico-system/csi-node-driver-ttxwp" Dec 13 15:23:06.112368 kubelet[1514]: I1213 15:23:06.112236 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ef1b7ee7-8a52-46a6-99ac-df9c05563ef4-registration-dir\") pod \"csi-node-driver-ttxwp\" (UID: \"ef1b7ee7-8a52-46a6-99ac-df9c05563ef4\") " pod="calico-system/csi-node-driver-ttxwp" Dec 13 15:23:06.112368 kubelet[1514]: I1213 15:23:06.112254 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c5m4s\" (UniqueName: \"kubernetes.io/projected/747f2d7f-d2f3-4eda-b93d-fadeec2de8fa-kube-api-access-c5m4s\") pod \"kube-proxy-c4k4x\" (UID: \"747f2d7f-d2f3-4eda-b93d-fadeec2de8fa\") " pod="kube-system/kube-proxy-c4k4x" Dec 13 15:23:06.112512 kubelet[1514]: I1213 15:23:06.112269 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/02b49a98-eb43-4b18-9c64-e40b03a5001f-xtables-lock\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.112512 kubelet[1514]: I1213 15:23:06.112286 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/02b49a98-eb43-4b18-9c64-e40b03a5001f-cni-bin-dir\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.112512 kubelet[1514]: I1213 15:23:06.112303 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h4s4x\" (UniqueName: \"kubernetes.io/projected/02b49a98-eb43-4b18-9c64-e40b03a5001f-kube-api-access-h4s4x\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.112512 kubelet[1514]: I1213 15:23:06.112320 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tt8z4\" (UniqueName: \"kubernetes.io/projected/ef1b7ee7-8a52-46a6-99ac-df9c05563ef4-kube-api-access-tt8z4\") pod \"csi-node-driver-ttxwp\" (UID: \"ef1b7ee7-8a52-46a6-99ac-df9c05563ef4\") " pod="calico-system/csi-node-driver-ttxwp" Dec 13 15:23:06.112512 kubelet[1514]: I1213 15:23:06.112370 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/747f2d7f-d2f3-4eda-b93d-fadeec2de8fa-kube-proxy\") pod \"kube-proxy-c4k4x\" (UID: \"747f2d7f-d2f3-4eda-b93d-fadeec2de8fa\") " pod="kube-system/kube-proxy-c4k4x" Dec 13 15:23:06.112644 kubelet[1514]: I1213 15:23:06.112394 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/747f2d7f-d2f3-4eda-b93d-fadeec2de8fa-lib-modules\") pod \"kube-proxy-c4k4x\" (UID: \"747f2d7f-d2f3-4eda-b93d-fadeec2de8fa\") " pod="kube-system/kube-proxy-c4k4x" Dec 13 15:23:06.112644 kubelet[1514]: I1213 15:23:06.112410 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ef1b7ee7-8a52-46a6-99ac-df9c05563ef4-varrun\") pod \"csi-node-driver-ttxwp\" (UID: \"ef1b7ee7-8a52-46a6-99ac-df9c05563ef4\") " pod="calico-system/csi-node-driver-ttxwp" Dec 13 15:23:06.112644 kubelet[1514]: I1213 15:23:06.112426 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/02b49a98-eb43-4b18-9c64-e40b03a5001f-var-lib-calico\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.112644 kubelet[1514]: I1213 15:23:06.112442 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/02b49a98-eb43-4b18-9c64-e40b03a5001f-flexvol-driver-host\") pod \"calico-node-5wz6p\" (UID: \"02b49a98-eb43-4b18-9c64-e40b03a5001f\") " pod="calico-system/calico-node-5wz6p" Dec 13 15:23:06.215376 kubelet[1514]: E1213 15:23:06.215345 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.215700 kubelet[1514]: W1213 15:23:06.215680 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.215796 kubelet[1514]: E1213 15:23:06.215783 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.216066 kubelet[1514]: E1213 15:23:06.216054 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.216145 kubelet[1514]: W1213 15:23:06.216133 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.216225 kubelet[1514]: E1213 15:23:06.216213 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.216476 kubelet[1514]: E1213 15:23:06.216454 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.216560 kubelet[1514]: W1213 15:23:06.216548 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.216630 kubelet[1514]: E1213 15:23:06.216620 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.216869 kubelet[1514]: E1213 15:23:06.216858 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.216945 kubelet[1514]: W1213 15:23:06.216933 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.217014 kubelet[1514]: E1213 15:23:06.217003 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.217428 kubelet[1514]: E1213 15:23:06.217392 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.217486 kubelet[1514]: W1213 15:23:06.217432 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.217576 kubelet[1514]: E1213 15:23:06.217490 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.217866 kubelet[1514]: E1213 15:23:06.217846 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.217911 kubelet[1514]: W1213 15:23:06.217871 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.217971 kubelet[1514]: E1213 15:23:06.217957 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.219421 kubelet[1514]: E1213 15:23:06.219392 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.219486 kubelet[1514]: W1213 15:23:06.219423 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.219555 kubelet[1514]: E1213 15:23:06.219541 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.221439 kubelet[1514]: E1213 15:23:06.221407 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.221498 kubelet[1514]: W1213 15:23:06.221442 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.221557 kubelet[1514]: E1213 15:23:06.221541 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.221809 kubelet[1514]: E1213 15:23:06.221790 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.221854 kubelet[1514]: W1213 15:23:06.221813 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.221920 kubelet[1514]: E1213 15:23:06.221907 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.223347 kubelet[1514]: E1213 15:23:06.223326 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.223347 kubelet[1514]: W1213 15:23:06.223344 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.223450 kubelet[1514]: E1213 15:23:06.223437 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.229132 kubelet[1514]: E1213 15:23:06.224175 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229132 kubelet[1514]: W1213 15:23:06.224192 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229132 kubelet[1514]: E1213 15:23:06.224382 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229132 kubelet[1514]: W1213 15:23:06.224389 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229132 kubelet[1514]: E1213 15:23:06.224573 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229132 kubelet[1514]: W1213 15:23:06.224583 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229132 kubelet[1514]: E1213 15:23:06.224742 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229132 kubelet[1514]: W1213 15:23:06.224750 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229132 kubelet[1514]: E1213 15:23:06.224889 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229132 kubelet[1514]: W1213 15:23:06.224896 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229132 kubelet[1514]: E1213 15:23:06.225038 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229505 kubelet[1514]: W1213 15:23:06.225045 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229505 kubelet[1514]: E1213 15:23:06.225182 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229505 kubelet[1514]: W1213 15:23:06.225189 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229505 kubelet[1514]: E1213 15:23:06.225352 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229505 kubelet[1514]: W1213 15:23:06.225359 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229505 kubelet[1514]: E1213 15:23:06.225518 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229505 kubelet[1514]: W1213 15:23:06.225525 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229505 kubelet[1514]: E1213 15:23:06.225537 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.229505 kubelet[1514]: E1213 15:23:06.225686 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229505 kubelet[1514]: W1213 15:23:06.225693 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229772 kubelet[1514]: E1213 15:23:06.225702 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.229772 kubelet[1514]: E1213 15:23:06.225890 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229772 kubelet[1514]: W1213 15:23:06.225898 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229772 kubelet[1514]: E1213 15:23:06.225907 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.229772 kubelet[1514]: E1213 15:23:06.225932 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.229772 kubelet[1514]: E1213 15:23:06.226079 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229772 kubelet[1514]: W1213 15:23:06.226088 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.229772 kubelet[1514]: E1213 15:23:06.226098 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.229772 kubelet[1514]: E1213 15:23:06.226265 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.229772 kubelet[1514]: W1213 15:23:06.226273 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.230027 kubelet[1514]: E1213 15:23:06.226282 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230027 kubelet[1514]: E1213 15:23:06.226450 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.230027 kubelet[1514]: W1213 15:23:06.226458 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.230027 kubelet[1514]: E1213 15:23:06.226477 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230027 kubelet[1514]: E1213 15:23:06.226497 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230027 kubelet[1514]: E1213 15:23:06.226686 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.230027 kubelet[1514]: W1213 15:23:06.226695 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.230027 kubelet[1514]: E1213 15:23:06.226705 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230027 kubelet[1514]: E1213 15:23:06.226853 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.230027 kubelet[1514]: W1213 15:23:06.226861 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.230592 kubelet[1514]: E1213 15:23:06.226869 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230592 kubelet[1514]: E1213 15:23:06.227149 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.230592 kubelet[1514]: W1213 15:23:06.227159 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.230592 kubelet[1514]: E1213 15:23:06.227169 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230592 kubelet[1514]: E1213 15:23:06.227189 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230592 kubelet[1514]: E1213 15:23:06.227224 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230592 kubelet[1514]: E1213 15:23:06.227381 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.230592 kubelet[1514]: W1213 15:23:06.227389 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.230592 kubelet[1514]: E1213 15:23:06.227397 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230592 kubelet[1514]: E1213 15:23:06.227582 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.230856 kubelet[1514]: W1213 15:23:06.227592 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.230856 kubelet[1514]: E1213 15:23:06.227601 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230856 kubelet[1514]: E1213 15:23:06.227616 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230856 kubelet[1514]: E1213 15:23:06.227783 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.230856 kubelet[1514]: W1213 15:23:06.227790 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.230856 kubelet[1514]: E1213 15:23:06.227799 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230856 kubelet[1514]: E1213 15:23:06.228015 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.230856 kubelet[1514]: E1213 15:23:06.228257 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.230856 kubelet[1514]: W1213 15:23:06.228266 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.230856 kubelet[1514]: E1213 15:23:06.228276 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.231129 kubelet[1514]: E1213 15:23:06.228490 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.231129 kubelet[1514]: W1213 15:23:06.228499 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.231129 kubelet[1514]: E1213 15:23:06.228508 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.231129 kubelet[1514]: E1213 15:23:06.230663 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.231129 kubelet[1514]: W1213 15:23:06.230674 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.231129 kubelet[1514]: E1213 15:23:06.230688 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.231129 kubelet[1514]: E1213 15:23:06.230709 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.231129 kubelet[1514]: E1213 15:23:06.230868 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.231129 kubelet[1514]: W1213 15:23:06.230876 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.231129 kubelet[1514]: E1213 15:23:06.230886 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.231418 kubelet[1514]: E1213 15:23:06.231059 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.231418 kubelet[1514]: W1213 15:23:06.231070 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.231418 kubelet[1514]: E1213 15:23:06.231079 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.231418 kubelet[1514]: E1213 15:23:06.231095 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.231418 kubelet[1514]: E1213 15:23:06.231263 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.231418 kubelet[1514]: W1213 15:23:06.231271 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.231418 kubelet[1514]: E1213 15:23:06.231280 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.231607 kubelet[1514]: E1213 15:23:06.231444 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.231607 kubelet[1514]: W1213 15:23:06.231451 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.231607 kubelet[1514]: E1213 15:23:06.231460 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.233377 kubelet[1514]: E1213 15:23:06.233362 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.233482 kubelet[1514]: W1213 15:23:06.233456 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.233560 kubelet[1514]: E1213 15:23:06.233549 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.239517 kubelet[1514]: E1213 15:23:06.239501 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.239616 kubelet[1514]: W1213 15:23:06.239603 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.239681 kubelet[1514]: E1213 15:23:06.239670 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.248342 kubelet[1514]: E1213 15:23:06.248279 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.248532 kubelet[1514]: W1213 15:23:06.248497 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.248696 kubelet[1514]: E1213 15:23:06.248663 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.249611 kubelet[1514]: E1213 15:23:06.249592 1514 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:23:06.249611 kubelet[1514]: W1213 15:23:06.249608 1514 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:23:06.249717 kubelet[1514]: E1213 15:23:06.249622 1514 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:23:06.405691 env[1197]: time="2024-12-13T15:23:06.405459829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5wz6p,Uid:02b49a98-eb43-4b18-9c64-e40b03a5001f,Namespace:calico-system,Attempt:0,}" Dec 13 15:23:06.414783 env[1197]: time="2024-12-13T15:23:06.414698670Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-c4k4x,Uid:747f2d7f-d2f3-4eda-b93d-fadeec2de8fa,Namespace:kube-system,Attempt:0,}" Dec 13 15:23:07.072769 kubelet[1514]: E1213 15:23:07.072703 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:07.353786 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1042091304.mount: Deactivated successfully. Dec 13 15:23:07.359314 env[1197]: time="2024-12-13T15:23:07.359258744Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:07.363462 env[1197]: time="2024-12-13T15:23:07.363391876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:07.365944 env[1197]: time="2024-12-13T15:23:07.365883505Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:07.373235 env[1197]: time="2024-12-13T15:23:07.373187892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:07.383804 env[1197]: time="2024-12-13T15:23:07.383754459Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:07.393933 env[1197]: time="2024-12-13T15:23:07.393900248Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:07.394743 env[1197]: time="2024-12-13T15:23:07.394718282Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:07.395464 env[1197]: time="2024-12-13T15:23:07.395444375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:07.396395 env[1197]: time="2024-12-13T15:23:07.396219820Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:23:07.396479 env[1197]: time="2024-12-13T15:23:07.396403489Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:23:07.397451 env[1197]: time="2024-12-13T15:23:07.397413628Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:23:07.397626 env[1197]: time="2024-12-13T15:23:07.397598109Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/98ec9c137278e7ccd4fc29b8c4a014eb5296edbc1f61dbfa60324ad16a46a5af pid=1608 runtime=io.containerd.runc.v2 Dec 13 15:23:07.406560 env[1197]: time="2024-12-13T15:23:07.406390886Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:23:07.406560 env[1197]: time="2024-12-13T15:23:07.406436227Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:23:07.406560 env[1197]: time="2024-12-13T15:23:07.406447734Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:23:07.406983 env[1197]: time="2024-12-13T15:23:07.406923180Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da0bcba2a2115fa9b3b95b9ff739b951da2deb2e3d7ba827e3f166b7ea7f3b30 pid=1625 runtime=io.containerd.runc.v2 Dec 13 15:23:07.422036 systemd[1]: Started cri-containerd-da0bcba2a2115fa9b3b95b9ff739b951da2deb2e3d7ba827e3f166b7ea7f3b30.scope. Dec 13 15:23:07.432030 systemd[1]: Started cri-containerd-98ec9c137278e7ccd4fc29b8c4a014eb5296edbc1f61dbfa60324ad16a46a5af.scope. Dec 13 15:23:07.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.447732 kernel: kauditd_printk_skb: 229 callbacks suppressed Dec 13 15:23:07.447819 kernel: audit: type=1400 audit(1734103387.445:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.453103 kernel: audit: type=1400 audit(1734103387.445:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.458741 kernel: audit: type=1400 audit(1734103387.445:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.458808 kernel: audit: type=1400 audit(1734103387.445:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.463713 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:23:07.463775 kernel: audit: type=1400 audit(1734103387.445:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.463808 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 15:23:07.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.468084 kernel: audit: type=1400 audit(1734103387.445:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.468132 kernel: audit: backlog limit exceeded Dec 13 15:23:07.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.471219 kernel: audit: type=1400 audit(1734103387.445:440): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.445000 audit: BPF prog-id=61 op=LOAD Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit[1631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1608 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:07.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938656339633133373237386537636364346663323962386334613031 Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit[1631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1608 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:07.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938656339633133373237386537636364346663323962386334613031 Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.446000 audit: BPF prog-id=62 op=LOAD Dec 13 15:23:07.446000 audit[1631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002eb1a0 items=0 ppid=1608 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:07.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938656339633133373237386537636364346663323962386334613031 Dec 13 15:23:07.449000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.449000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.449000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.449000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.449000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.449000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.449000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.449000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.449000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.449000 audit: BPF prog-id=63 op=LOAD Dec 13 15:23:07.449000 audit[1631]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002eb1e8 items=0 ppid=1608 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:07.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938656339633133373237386537636364346663323962386334613031 Dec 13 15:23:07.454000 audit: BPF prog-id=63 op=UNLOAD Dec 13 15:23:07.454000 audit: BPF prog-id=62 op=UNLOAD Dec 13 15:23:07.454000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.454000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.454000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.454000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.454000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.454000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.454000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.454000 audit[1631]: AVC avc: denied { perfmon } for pid=1631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.454000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.454000 audit[1631]: AVC avc: denied { bpf } for pid=1631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.454000 audit: BPF prog-id=64 op=LOAD Dec 13 15:23:07.454000 audit[1631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002eb5f8 items=0 ppid=1608 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:07.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938656339633133373237386537636364346663323962386334613031 Dec 13 15:23:07.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.466000 audit: BPF prog-id=65 op=LOAD Dec 13 15:23:07.470000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:07.470000 audit[1638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1625 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:07.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461306263626132613231313566613962336239356239666637333962 Dec 13 15:23:07.492313 env[1197]: time="2024-12-13T15:23:07.492275201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5wz6p,Uid:02b49a98-eb43-4b18-9c64-e40b03a5001f,Namespace:calico-system,Attempt:0,} returns sandbox id \"98ec9c137278e7ccd4fc29b8c4a014eb5296edbc1f61dbfa60324ad16a46a5af\"" Dec 13 15:23:07.495048 env[1197]: time="2024-12-13T15:23:07.494994296Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 15:23:07.496207 env[1197]: time="2024-12-13T15:23:07.496167454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-c4k4x,Uid:747f2d7f-d2f3-4eda-b93d-fadeec2de8fa,Namespace:kube-system,Attempt:0,} returns sandbox id \"da0bcba2a2115fa9b3b95b9ff739b951da2deb2e3d7ba827e3f166b7ea7f3b30\"" Dec 13 15:23:08.073795 kubelet[1514]: E1213 15:23:08.073725 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:08.242827 kubelet[1514]: E1213 15:23:08.242751 1514 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttxwp" podUID="ef1b7ee7-8a52-46a6-99ac-df9c05563ef4" Dec 13 15:23:08.879276 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1010495795.mount: Deactivated successfully. Dec 13 15:23:09.015614 env[1197]: time="2024-12-13T15:23:09.015562764Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:09.017266 env[1197]: time="2024-12-13T15:23:09.017239348Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:09.018984 env[1197]: time="2024-12-13T15:23:09.018961404Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:09.020753 env[1197]: time="2024-12-13T15:23:09.020731261Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:09.021771 env[1197]: time="2024-12-13T15:23:09.021712942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 15:23:09.025372 env[1197]: time="2024-12-13T15:23:09.025346098Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 15:23:09.027784 env[1197]: time="2024-12-13T15:23:09.027749943Z" level=info msg="CreateContainer within sandbox \"98ec9c137278e7ccd4fc29b8c4a014eb5296edbc1f61dbfa60324ad16a46a5af\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 15:23:09.039721 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3498480517.mount: Deactivated successfully. Dec 13 15:23:09.043058 env[1197]: time="2024-12-13T15:23:09.043023336Z" level=info msg="CreateContainer within sandbox \"98ec9c137278e7ccd4fc29b8c4a014eb5296edbc1f61dbfa60324ad16a46a5af\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3cd2c3022505cdb282db4829007ccf345bbfbbdbdad783039596994be4d4e2b5\"" Dec 13 15:23:09.043887 env[1197]: time="2024-12-13T15:23:09.043863031Z" level=info msg="StartContainer for \"3cd2c3022505cdb282db4829007ccf345bbfbbdbdad783039596994be4d4e2b5\"" Dec 13 15:23:09.067052 systemd[1]: Started cri-containerd-3cd2c3022505cdb282db4829007ccf345bbfbbdbdad783039596994be4d4e2b5.scope. Dec 13 15:23:09.073870 kubelet[1514]: E1213 15:23:09.073803 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:09.086000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.086000 audit[1689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0bc51d2378 items=0 ppid=1608 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:09.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643263333032323530356364623238326462343832393030376363 Dec 13 15:23:09.086000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.086000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.086000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.086000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.086000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.086000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.086000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.086000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.086000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.086000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.086000 audit: BPF prog-id=69 op=LOAD Dec 13 15:23:09.086000 audit[1689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002efc58 items=0 ppid=1608 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:09.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643263333032323530356364623238326462343832393030376363 Dec 13 15:23:09.087000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.087000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.087000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.087000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.087000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.087000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.087000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.087000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.087000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.087000 audit: BPF prog-id=70 op=LOAD Dec 13 15:23:09.087000 audit[1689]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002efca8 items=0 ppid=1608 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:09.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643263333032323530356364623238326462343832393030376363 Dec 13 15:23:09.088000 audit: BPF prog-id=70 op=UNLOAD Dec 13 15:23:09.088000 audit: BPF prog-id=69 op=UNLOAD Dec 13 15:23:09.088000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.088000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.088000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.088000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.088000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.088000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.088000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.088000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.088000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.088000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:09.088000 audit: BPF prog-id=71 op=LOAD Dec 13 15:23:09.088000 audit[1689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002efd38 items=0 ppid=1608 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:09.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643263333032323530356364623238326462343832393030376363 Dec 13 15:23:09.113720 env[1197]: time="2024-12-13T15:23:09.113677896Z" level=info msg="StartContainer for \"3cd2c3022505cdb282db4829007ccf345bbfbbdbdad783039596994be4d4e2b5\" returns successfully" Dec 13 15:23:09.123282 systemd[1]: cri-containerd-3cd2c3022505cdb282db4829007ccf345bbfbbdbdad783039596994be4d4e2b5.scope: Deactivated successfully. Dec 13 15:23:09.128000 audit: BPF prog-id=71 op=UNLOAD Dec 13 15:23:09.174766 env[1197]: time="2024-12-13T15:23:09.174720266Z" level=info msg="shim disconnected" id=3cd2c3022505cdb282db4829007ccf345bbfbbdbdad783039596994be4d4e2b5 Dec 13 15:23:09.174766 env[1197]: time="2024-12-13T15:23:09.174766766Z" level=warning msg="cleaning up after shim disconnected" id=3cd2c3022505cdb282db4829007ccf345bbfbbdbdad783039596994be4d4e2b5 namespace=k8s.io Dec 13 15:23:09.175006 env[1197]: time="2024-12-13T15:23:09.174777107Z" level=info msg="cleaning up dead shim" Dec 13 15:23:09.183988 env[1197]: time="2024-12-13T15:23:09.183930982Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:23:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1727 runtime=io.containerd.runc.v2\n" Dec 13 15:23:10.074887 kubelet[1514]: E1213 15:23:10.074829 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:10.244176 kubelet[1514]: E1213 15:23:10.244111 1514 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttxwp" podUID="ef1b7ee7-8a52-46a6-99ac-df9c05563ef4" Dec 13 15:23:10.409920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1951636110.mount: Deactivated successfully. Dec 13 15:23:11.074970 env[1197]: time="2024-12-13T15:23:11.074867334Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:11.076014 kubelet[1514]: E1213 15:23:11.075938 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:11.078103 env[1197]: time="2024-12-13T15:23:11.078033023Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:11.080218 env[1197]: time="2024-12-13T15:23:11.080157112Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:11.081617 env[1197]: time="2024-12-13T15:23:11.081575797Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:11.083136 env[1197]: time="2024-12-13T15:23:11.083100570Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 15:23:11.085807 env[1197]: time="2024-12-13T15:23:11.085706678Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 15:23:11.087429 env[1197]: time="2024-12-13T15:23:11.087355985Z" level=info msg="CreateContainer within sandbox \"da0bcba2a2115fa9b3b95b9ff739b951da2deb2e3d7ba827e3f166b7ea7f3b30\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 15:23:11.103908 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3963692487.mount: Deactivated successfully. Dec 13 15:23:11.112373 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2237459230.mount: Deactivated successfully. Dec 13 15:23:11.114898 env[1197]: time="2024-12-13T15:23:11.114841650Z" level=info msg="CreateContainer within sandbox \"da0bcba2a2115fa9b3b95b9ff739b951da2deb2e3d7ba827e3f166b7ea7f3b30\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"abd22a6a28cecbaec1be4db5edc91c7684c540f4a176293faf62b65ca5921cc0\"" Dec 13 15:23:11.115930 env[1197]: time="2024-12-13T15:23:11.115901211Z" level=info msg="StartContainer for \"abd22a6a28cecbaec1be4db5edc91c7684c540f4a176293faf62b65ca5921cc0\"" Dec 13 15:23:11.137613 systemd[1]: Started cri-containerd-abd22a6a28cecbaec1be4db5edc91c7684c540f4a176293faf62b65ca5921cc0.scope. Dec 13 15:23:11.159000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.159000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f742af292f8 items=0 ppid=1625 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162643232613661323863656362616563316265346462356564633931 Dec 13 15:23:11.159000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.159000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.159000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.159000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.159000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.159000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.159000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.159000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.159000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.159000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.159000 audit: BPF prog-id=72 op=LOAD Dec 13 15:23:11.159000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024258 items=0 ppid=1625 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162643232613661323863656362616563316265346462356564633931 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit: BPF prog-id=73 op=LOAD Dec 13 15:23:11.160000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000242a8 items=0 ppid=1625 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162643232613661323863656362616563316265346462356564633931 Dec 13 15:23:11.160000 audit: BPF prog-id=73 op=UNLOAD Dec 13 15:23:11.160000 audit: BPF prog-id=72 op=UNLOAD Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:11.160000 audit: BPF prog-id=74 op=LOAD Dec 13 15:23:11.160000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024338 items=0 ppid=1625 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162643232613661323863656362616563316265346462356564633931 Dec 13 15:23:11.181370 env[1197]: time="2024-12-13T15:23:11.181322250Z" level=info msg="StartContainer for \"abd22a6a28cecbaec1be4db5edc91c7684c540f4a176293faf62b65ca5921cc0\" returns successfully" Dec 13 15:23:11.272000 audit[1805]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.272000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc03633a00 a2=0 a3=7ffc036339ec items=0 ppid=1764 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:23:11.273000 audit[1806]: NETFILTER_CFG table=nat:15 family=10 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.273000 audit[1807]: NETFILTER_CFG table=mangle:16 family=2 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.273000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcaf77e430 a2=0 a3=7ffcaf77e41c items=0 ppid=1764 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:23:11.273000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc8ca7170 a2=0 a3=7fffc8ca715c items=0 ppid=1764 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:23:11.275000 audit[1808]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.275000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc6a11a80 a2=0 a3=7ffcc6a11a6c items=0 ppid=1764 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.275000 audit[1809]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.275000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe849f7550 a2=0 a3=7ffe849f753c items=0 ppid=1764 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:23:11.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:23:11.278000 audit[1810]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.278000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee8c6d1a0 a2=0 a3=7ffee8c6d18c items=0 ppid=1764 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.278000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:23:11.282418 kubelet[1514]: I1213 15:23:11.282372 1514 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-c4k4x" podStartSLOduration=3.6949514150000002 podStartE2EDuration="7.282342386s" podCreationTimestamp="2024-12-13 15:23:04 +0000 UTC" firstStartedPulling="2024-12-13 15:23:07.497122097 +0000 UTC m=+3.939545346" lastFinishedPulling="2024-12-13 15:23:11.084513044 +0000 UTC m=+7.526936317" observedRunningTime="2024-12-13 15:23:11.281588872 +0000 UTC m=+7.724012141" watchObservedRunningTime="2024-12-13 15:23:11.282342386 +0000 UTC m=+7.724765658" Dec 13 15:23:11.377000 audit[1811]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.377000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc3a783d70 a2=0 a3=7ffc3a783d5c items=0 ppid=1764 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:23:11.386000 audit[1813]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.386000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc558eedc0 a2=0 a3=7ffc558eedac items=0 ppid=1764 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.386000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 15:23:11.394000 audit[1816]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.394000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffca0453cc0 a2=0 a3=7ffca0453cac items=0 ppid=1764 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 15:23:11.398000 audit[1817]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.398000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2911c270 a2=0 a3=7fff2911c25c items=0 ppid=1764 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.398000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:23:11.402000 audit[1819]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.402000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2ca403a0 a2=0 a3=7ffc2ca4038c items=0 ppid=1764 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.402000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:23:11.404000 audit[1820]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.404000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbbf13280 a2=0 a3=7ffdbbf1326c items=0 ppid=1764 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:23:11.413000 audit[1822]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.413000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff2b3eb190 a2=0 a3=7fff2b3eb17c items=0 ppid=1764 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:23:11.419000 audit[1825]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.419000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc1dc15c30 a2=0 a3=7ffc1dc15c1c items=0 ppid=1764 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 15:23:11.420000 audit[1826]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.420000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa87210b0 a2=0 a3=7fffa872109c items=0 ppid=1764 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:23:11.424000 audit[1828]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.424000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe6c63aeb0 a2=0 a3=7ffe6c63ae9c items=0 ppid=1764 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:23:11.426000 audit[1829]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.426000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0ad210f0 a2=0 a3=7fff0ad210dc items=0 ppid=1764 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:23:11.430000 audit[1831]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.430000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6a73de90 a2=0 a3=7fff6a73de7c items=0 ppid=1764 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:23:11.435000 audit[1834]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.435000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff88a2dff0 a2=0 a3=7fff88a2dfdc items=0 ppid=1764 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:23:11.440000 audit[1837]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.440000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed1ac7d60 a2=0 a3=7ffed1ac7d4c items=0 ppid=1764 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:23:11.441000 audit[1838]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.441000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe7c0f87d0 a2=0 a3=7ffe7c0f87bc items=0 ppid=1764 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:23:11.445000 audit[1840]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.445000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc050c9f60 a2=0 a3=7ffc050c9f4c items=0 ppid=1764 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:23:11.485000 audit[1845]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.485000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcd431c0a0 a2=0 a3=7ffcd431c08c items=0 ppid=1764 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:23:11.489000 audit[1846]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.489000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff0f55320 a2=0 a3=7ffff0f5530c items=0 ppid=1764 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:23:11.493000 audit[1848]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1848 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:23:11.493000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe8c407ea0 a2=0 a3=7ffe8c407e8c items=0 ppid=1764 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:23:11.510000 audit[1854]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:11.510000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff25f519e0 a2=0 a3=7fff25f519cc items=0 ppid=1764 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:11.545000 audit[1854]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:11.545000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7fff25f519e0 a2=0 a3=7fff25f519cc items=0 ppid=1764 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.545000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:11.559000 audit[1862]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.559000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc34072a0 a2=0 a3=7fffc340728c items=0 ppid=1764 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:23:11.566000 audit[1864]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.566000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff8fabb270 a2=0 a3=7fff8fabb25c items=0 ppid=1764 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.566000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 15:23:11.575000 audit[1867]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.575000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdbc14b5c0 a2=0 a3=7ffdbc14b5ac items=0 ppid=1764 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 15:23:11.577000 audit[1868]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.577000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7a066320 a2=0 a3=7ffd7a06630c items=0 ppid=1764 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:23:11.582000 audit[1870]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.582000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc17a7370 a2=0 a3=7ffcc17a735c items=0 ppid=1764 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:23:11.584000 audit[1871]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1871 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.584000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3dc08a90 a2=0 a3=7ffd3dc08a7c items=0 ppid=1764 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:23:11.588000 audit[1873]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.588000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff7083dcf0 a2=0 a3=7fff7083dcdc items=0 ppid=1764 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 15:23:11.593000 audit[1876]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.593000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd8efb4ac0 a2=0 a3=7ffd8efb4aac items=0 ppid=1764 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.593000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:23:11.594000 audit[1877]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.594000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde1e7e670 a2=0 a3=7ffde1e7e65c items=0 ppid=1764 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:23:11.599000 audit[1879]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.599000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd054d4c90 a2=0 a3=7ffd054d4c7c items=0 ppid=1764 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:23:11.602000 audit[1880]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.602000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd330fdf30 a2=0 a3=7ffd330fdf1c items=0 ppid=1764 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.602000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:23:11.607000 audit[1882]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1882 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.607000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2e038650 a2=0 a3=7ffd2e03863c items=0 ppid=1764 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:23:11.617000 audit[1885]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.617000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1910df40 a2=0 a3=7ffc1910df2c items=0 ppid=1764 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:23:11.624000 audit[1888]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1888 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.624000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0267abd0 a2=0 a3=7ffc0267abbc items=0 ppid=1764 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 15:23:11.625000 audit[1889]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1889 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.625000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd0ff6de90 a2=0 a3=7ffd0ff6de7c items=0 ppid=1764 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:23:11.628000 audit[1891]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.628000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcd4d34510 a2=0 a3=7ffcd4d344fc items=0 ppid=1764 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:23:11.636000 audit[1894]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.636000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff189fac20 a2=0 a3=7fff189fac0c items=0 ppid=1764 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:23:11.639000 audit[1895]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.639000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc730447a0 a2=0 a3=7ffc7304478c items=0 ppid=1764 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:23:11.643000 audit[1897]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.643000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffffedf2910 a2=0 a3=7ffffedf28fc items=0 ppid=1764 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:23:11.645000 audit[1898]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.645000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcce5ecb00 a2=0 a3=7ffcce5ecaec items=0 ppid=1764 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:23:11.648000 audit[1900]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1900 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.648000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffb1b3b640 a2=0 a3=7fffb1b3b62c items=0 ppid=1764 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:23:11.652000 audit[1903]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1903 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:23:11.652000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea30dd920 a2=0 a3=7ffea30dd90c items=0 ppid=1764 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:23:11.655000 audit[1905]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:23:11.655000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd75fff390 a2=0 a3=7ffd75fff37c items=0 ppid=1764 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.655000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:11.656000 audit[1905]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:23:11.656000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd75fff390 a2=0 a3=7ffd75fff37c items=0 ppid=1764 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:11.656000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:12.077180 kubelet[1514]: E1213 15:23:12.077106 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:12.242733 kubelet[1514]: E1213 15:23:12.242502 1514 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttxwp" podUID="ef1b7ee7-8a52-46a6-99ac-df9c05563ef4" Dec 13 15:23:13.077850 kubelet[1514]: E1213 15:23:13.077710 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:14.078739 kubelet[1514]: E1213 15:23:14.078605 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:14.243285 kubelet[1514]: E1213 15:23:14.242327 1514 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttxwp" podUID="ef1b7ee7-8a52-46a6-99ac-df9c05563ef4" Dec 13 15:23:14.832273 update_engine[1188]: I1213 15:23:14.831246 1188 update_attempter.cc:509] Updating boot flags... Dec 13 15:23:15.079537 kubelet[1514]: E1213 15:23:15.079471 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:16.080276 kubelet[1514]: E1213 15:23:16.080213 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:16.243086 kubelet[1514]: E1213 15:23:16.242379 1514 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttxwp" podUID="ef1b7ee7-8a52-46a6-99ac-df9c05563ef4" Dec 13 15:23:16.737477 env[1197]: time="2024-12-13T15:23:16.737416794Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:16.738763 env[1197]: time="2024-12-13T15:23:16.738727924Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:16.740130 env[1197]: time="2024-12-13T15:23:16.740095589Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:16.741611 env[1197]: time="2024-12-13T15:23:16.741580356Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:16.743001 env[1197]: time="2024-12-13T15:23:16.742968131Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 15:23:16.745623 env[1197]: time="2024-12-13T15:23:16.745591284Z" level=info msg="CreateContainer within sandbox \"98ec9c137278e7ccd4fc29b8c4a014eb5296edbc1f61dbfa60324ad16a46a5af\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 15:23:16.754490 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount749461228.mount: Deactivated successfully. Dec 13 15:23:16.756571 env[1197]: time="2024-12-13T15:23:16.756537152Z" level=info msg="CreateContainer within sandbox \"98ec9c137278e7ccd4fc29b8c4a014eb5296edbc1f61dbfa60324ad16a46a5af\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"43d513644cd7f2cc3ad173d64a9128accd145d7d127507cb4c422c0a92e672cc\"" Dec 13 15:23:16.757177 env[1197]: time="2024-12-13T15:23:16.757155103Z" level=info msg="StartContainer for \"43d513644cd7f2cc3ad173d64a9128accd145d7d127507cb4c422c0a92e672cc\"" Dec 13 15:23:16.793835 systemd[1]: Started cri-containerd-43d513644cd7f2cc3ad173d64a9128accd145d7d127507cb4c422c0a92e672cc.scope. Dec 13 15:23:16.809000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.812679 kernel: kauditd_printk_skb: 408 callbacks suppressed Dec 13 15:23:16.812809 kernel: audit: type=1400 audit(1734103396.809:527): avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.809000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f557067c948 items=0 ppid=1608 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:16.819712 kernel: audit: type=1300 audit(1734103396.809:527): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f557067c948 items=0 ppid=1608 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:16.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643531333634346364376632636333616431373364363461393132 Dec 13 15:23:16.823650 kernel: audit: type=1327 audit(1734103396.809:527): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643531333634346364376632636333616431373364363461393132 Dec 13 15:23:16.823708 kernel: audit: type=1400 audit(1734103396.810:528): avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.810000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.826448 kernel: audit: type=1400 audit(1734103396.810:528): avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.810000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.831855 kernel: audit: type=1400 audit(1734103396.810:528): avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.831920 kernel: audit: type=1400 audit(1734103396.810:528): avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.810000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.810000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.810000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.837443 kernel: audit: type=1400 audit(1734103396.810:528): avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.810000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.840321 kernel: audit: type=1400 audit(1734103396.810:528): avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.840363 kernel: audit: type=1400 audit(1734103396.810:528): avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.810000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.810000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.810000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.810000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.810000 audit: BPF prog-id=75 op=LOAD Dec 13 15:23:16.810000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000328f28 items=0 ppid=1608 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:16.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643531333634346364376632636333616431373364363461393132 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit: BPF prog-id=76 op=LOAD Dec 13 15:23:16.818000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000328f78 items=0 ppid=1608 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:16.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643531333634346364376632636333616431373364363461393132 Dec 13 15:23:16.818000 audit: BPF prog-id=76 op=UNLOAD Dec 13 15:23:16.818000 audit: BPF prog-id=75 op=UNLOAD Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:16.818000 audit: BPF prog-id=77 op=LOAD Dec 13 15:23:16.818000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000329008 items=0 ppid=1608 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:16.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643531333634346364376632636333616431373364363461393132 Dec 13 15:23:16.858162 env[1197]: time="2024-12-13T15:23:16.858112419Z" level=info msg="StartContainer for \"43d513644cd7f2cc3ad173d64a9128accd145d7d127507cb4c422c0a92e672cc\" returns successfully" Dec 13 15:23:17.081393 kubelet[1514]: E1213 15:23:17.081235 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:17.455732 env[1197]: time="2024-12-13T15:23:17.455603295Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:23:17.459450 systemd[1]: cri-containerd-43d513644cd7f2cc3ad173d64a9128accd145d7d127507cb4c422c0a92e672cc.scope: Deactivated successfully. Dec 13 15:23:17.461000 audit: BPF prog-id=77 op=UNLOAD Dec 13 15:23:17.478931 kubelet[1514]: I1213 15:23:17.477517 1514 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 15:23:17.559052 env[1197]: time="2024-12-13T15:23:17.558953164Z" level=info msg="shim disconnected" id=43d513644cd7f2cc3ad173d64a9128accd145d7d127507cb4c422c0a92e672cc Dec 13 15:23:17.559052 env[1197]: time="2024-12-13T15:23:17.559051757Z" level=warning msg="cleaning up after shim disconnected" id=43d513644cd7f2cc3ad173d64a9128accd145d7d127507cb4c422c0a92e672cc namespace=k8s.io Dec 13 15:23:17.559052 env[1197]: time="2024-12-13T15:23:17.559077262Z" level=info msg="cleaning up dead shim" Dec 13 15:23:17.572046 env[1197]: time="2024-12-13T15:23:17.572000946Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:23:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1969 runtime=io.containerd.runc.v2\n" Dec 13 15:23:17.755123 systemd[1]: run-containerd-runc-k8s.io-43d513644cd7f2cc3ad173d64a9128accd145d7d127507cb4c422c0a92e672cc-runc.icTZ5Y.mount: Deactivated successfully. Dec 13 15:23:17.755396 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-43d513644cd7f2cc3ad173d64a9128accd145d7d127507cb4c422c0a92e672cc-rootfs.mount: Deactivated successfully. Dec 13 15:23:18.082290 kubelet[1514]: E1213 15:23:18.082009 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:18.258670 systemd[1]: Created slice kubepods-besteffort-podef1b7ee7_8a52_46a6_99ac_df9c05563ef4.slice. Dec 13 15:23:18.261170 env[1197]: time="2024-12-13T15:23:18.261117025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttxwp,Uid:ef1b7ee7-8a52-46a6-99ac-df9c05563ef4,Namespace:calico-system,Attempt:0,}" Dec 13 15:23:18.287005 env[1197]: time="2024-12-13T15:23:18.286972081Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 15:23:18.334254 env[1197]: time="2024-12-13T15:23:18.334044281Z" level=error msg="Failed to destroy network for sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:23:18.336572 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3-shm.mount: Deactivated successfully. Dec 13 15:23:18.338540 env[1197]: time="2024-12-13T15:23:18.338491743Z" level=error msg="encountered an error cleaning up failed sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:23:18.338705 env[1197]: time="2024-12-13T15:23:18.338676894Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttxwp,Uid:ef1b7ee7-8a52-46a6-99ac-df9c05563ef4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:23:18.339478 kubelet[1514]: E1213 15:23:18.338994 1514 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:23:18.339478 kubelet[1514]: E1213 15:23:18.339069 1514 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ttxwp" Dec 13 15:23:18.339478 kubelet[1514]: E1213 15:23:18.339091 1514 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ttxwp" Dec 13 15:23:18.339647 kubelet[1514]: E1213 15:23:18.339134 1514 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ttxwp_calico-system(ef1b7ee7-8a52-46a6-99ac-df9c05563ef4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ttxwp_calico-system(ef1b7ee7-8a52-46a6-99ac-df9c05563ef4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ttxwp" podUID="ef1b7ee7-8a52-46a6-99ac-df9c05563ef4" Dec 13 15:23:19.082391 kubelet[1514]: E1213 15:23:19.082294 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:19.292899 kubelet[1514]: I1213 15:23:19.291761 1514 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:23:19.294522 env[1197]: time="2024-12-13T15:23:19.294385798Z" level=info msg="StopPodSandbox for \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\"" Dec 13 15:23:19.334305 env[1197]: time="2024-12-13T15:23:19.334125057Z" level=error msg="StopPodSandbox for \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\" failed" error="failed to destroy network for sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:23:19.334830 kubelet[1514]: E1213 15:23:19.334604 1514 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:23:19.334830 kubelet[1514]: E1213 15:23:19.334661 1514 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3"} Dec 13 15:23:19.334830 kubelet[1514]: E1213 15:23:19.334755 1514 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ef1b7ee7-8a52-46a6-99ac-df9c05563ef4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:23:19.334830 kubelet[1514]: E1213 15:23:19.334784 1514 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ef1b7ee7-8a52-46a6-99ac-df9c05563ef4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ttxwp" podUID="ef1b7ee7-8a52-46a6-99ac-df9c05563ef4" Dec 13 15:23:20.082722 kubelet[1514]: E1213 15:23:20.082632 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:21.082991 kubelet[1514]: E1213 15:23:21.082916 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:22.083792 kubelet[1514]: E1213 15:23:22.083687 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:22.742782 kubelet[1514]: I1213 15:23:22.742594 1514 topology_manager.go:215] "Topology Admit Handler" podUID="78b4e62d-4560-402e-937c-98d906817bb4" podNamespace="default" podName="nginx-deployment-85f456d6dd-h86rq" Dec 13 15:23:22.753417 systemd[1]: Created slice kubepods-besteffort-pod78b4e62d_4560_402e_937c_98d906817bb4.slice. Dec 13 15:23:22.934813 kubelet[1514]: I1213 15:23:22.934734 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zzthb\" (UniqueName: \"kubernetes.io/projected/78b4e62d-4560-402e-937c-98d906817bb4-kube-api-access-zzthb\") pod \"nginx-deployment-85f456d6dd-h86rq\" (UID: \"78b4e62d-4560-402e-937c-98d906817bb4\") " pod="default/nginx-deployment-85f456d6dd-h86rq" Dec 13 15:23:23.084636 kubelet[1514]: E1213 15:23:23.084224 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:23.361704 env[1197]: time="2024-12-13T15:23:23.361036299Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-h86rq,Uid:78b4e62d-4560-402e-937c-98d906817bb4,Namespace:default,Attempt:0,}" Dec 13 15:23:23.515352 env[1197]: time="2024-12-13T15:23:23.515285446Z" level=error msg="Failed to destroy network for sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:23:23.517080 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025-shm.mount: Deactivated successfully. Dec 13 15:23:23.518009 env[1197]: time="2024-12-13T15:23:23.517968359Z" level=error msg="encountered an error cleaning up failed sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:23:23.518085 env[1197]: time="2024-12-13T15:23:23.518030424Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-h86rq,Uid:78b4e62d-4560-402e-937c-98d906817bb4,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:23:23.518295 kubelet[1514]: E1213 15:23:23.518264 1514 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:23:23.518365 kubelet[1514]: E1213 15:23:23.518323 1514 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-h86rq" Dec 13 15:23:23.518365 kubelet[1514]: E1213 15:23:23.518344 1514 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-h86rq" Dec 13 15:23:23.518432 kubelet[1514]: E1213 15:23:23.518385 1514 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-h86rq_default(78b4e62d-4560-402e-937c-98d906817bb4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-h86rq_default(78b4e62d-4560-402e-937c-98d906817bb4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-h86rq" podUID="78b4e62d-4560-402e-937c-98d906817bb4" Dec 13 15:23:24.061701 kubelet[1514]: E1213 15:23:24.061605 1514 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:24.086055 kubelet[1514]: E1213 15:23:24.085959 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:24.303163 kubelet[1514]: I1213 15:23:24.303010 1514 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:23:24.303796 env[1197]: time="2024-12-13T15:23:24.303735972Z" level=info msg="StopPodSandbox for \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\"" Dec 13 15:23:24.350704 env[1197]: time="2024-12-13T15:23:24.350530753Z" level=error msg="StopPodSandbox for \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\" failed" error="failed to destroy network for sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:23:24.351673 kubelet[1514]: E1213 15:23:24.351345 1514 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:23:24.351673 kubelet[1514]: E1213 15:23:24.351429 1514 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025"} Dec 13 15:23:24.351673 kubelet[1514]: E1213 15:23:24.351503 1514 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"78b4e62d-4560-402e-937c-98d906817bb4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:23:24.351673 kubelet[1514]: E1213 15:23:24.351576 1514 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"78b4e62d-4560-402e-937c-98d906817bb4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-h86rq" podUID="78b4e62d-4560-402e-937c-98d906817bb4" Dec 13 15:23:25.086917 kubelet[1514]: E1213 15:23:25.086854 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:26.087677 kubelet[1514]: E1213 15:23:26.087604 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:26.573625 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4140947474.mount: Deactivated successfully. Dec 13 15:23:26.606144 env[1197]: time="2024-12-13T15:23:26.606086792Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:26.608278 env[1197]: time="2024-12-13T15:23:26.608244873Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:26.609315 env[1197]: time="2024-12-13T15:23:26.609289457Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:26.610363 env[1197]: time="2024-12-13T15:23:26.610337987Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:26.610880 env[1197]: time="2024-12-13T15:23:26.610853775Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 15:23:26.626505 env[1197]: time="2024-12-13T15:23:26.626459147Z" level=info msg="CreateContainer within sandbox \"98ec9c137278e7ccd4fc29b8c4a014eb5296edbc1f61dbfa60324ad16a46a5af\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 15:23:26.640333 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount22686528.mount: Deactivated successfully. Dec 13 15:23:26.643465 env[1197]: time="2024-12-13T15:23:26.643417028Z" level=info msg="CreateContainer within sandbox \"98ec9c137278e7ccd4fc29b8c4a014eb5296edbc1f61dbfa60324ad16a46a5af\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a624810810c63c4bf0ad917e8c3c6398c5ae5951ba3342469964b80c89435966\"" Dec 13 15:23:26.644379 env[1197]: time="2024-12-13T15:23:26.644350402Z" level=info msg="StartContainer for \"a624810810c63c4bf0ad917e8c3c6398c5ae5951ba3342469964b80c89435966\"" Dec 13 15:23:26.664892 systemd[1]: Started cri-containerd-a624810810c63c4bf0ad917e8c3c6398c5ae5951ba3342469964b80c89435966.scope. Dec 13 15:23:26.698752 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 15:23:26.699042 kernel: audit: type=1400 audit(1734103406.690:534): avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.690000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.690000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9c51040018 items=0 ppid=1608 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:26.706212 kernel: audit: type=1300 audit(1734103406.690:534): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9c51040018 items=0 ppid=1608 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:26.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136323438313038313063363363346266306164393137653863336336 Dec 13 15:23:26.712070 kernel: audit: type=1327 audit(1734103406.690:534): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136323438313038313063363363346266306164393137653863336336 Dec 13 15:23:26.694000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.694000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.719232 kernel: audit: type=1400 audit(1734103406.694:535): avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.719295 kernel: audit: type=1400 audit(1734103406.694:535): avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.719319 kernel: audit: type=1400 audit(1734103406.694:535): avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.694000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.728765 kernel: audit: type=1400 audit(1734103406.694:535): avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.728837 kernel: audit: type=1400 audit(1734103406.694:535): avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.694000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.694000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.694000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.735445 kernel: audit: type=1400 audit(1734103406.694:535): avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.735507 kernel: audit: type=1400 audit(1734103406.694:535): avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.694000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.694000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.694000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.694000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.694000 audit: BPF prog-id=78 op=LOAD Dec 13 15:23:26.735938 env[1197]: time="2024-12-13T15:23:26.735859747Z" level=info msg="StartContainer for \"a624810810c63c4bf0ad917e8c3c6398c5ae5951ba3342469964b80c89435966\" returns successfully" Dec 13 15:23:26.694000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fa6f8 items=0 ppid=1608 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:26.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136323438313038313063363363346266306164393137653863336336 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit: BPF prog-id=79 op=LOAD Dec 13 15:23:26.699000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fa748 items=0 ppid=1608 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:26.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136323438313038313063363363346266306164393137653863336336 Dec 13 15:23:26.699000 audit: BPF prog-id=79 op=UNLOAD Dec 13 15:23:26.699000 audit: BPF prog-id=78 op=UNLOAD Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:26.699000 audit: BPF prog-id=80 op=LOAD Dec 13 15:23:26.699000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fa7d8 items=0 ppid=1608 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:26.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136323438313038313063363363346266306164393137653863336336 Dec 13 15:23:26.835638 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 15:23:26.835770 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 15:23:27.088349 kubelet[1514]: E1213 15:23:27.088258 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:27.344321 kubelet[1514]: I1213 15:23:27.344121 1514 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-5wz6p" podStartSLOduration=4.226309851 podStartE2EDuration="23.344105169s" podCreationTimestamp="2024-12-13 15:23:04 +0000 UTC" firstStartedPulling="2024-12-13 15:23:07.494144801 +0000 UTC m=+3.936568054" lastFinishedPulling="2024-12-13 15:23:26.611940121 +0000 UTC m=+23.054363372" observedRunningTime="2024-12-13 15:23:27.341378054 +0000 UTC m=+23.783801338" watchObservedRunningTime="2024-12-13 15:23:27.344105169 +0000 UTC m=+23.786528439" Dec 13 15:23:28.089055 kubelet[1514]: E1213 15:23:28.088992 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:28.351000 audit[2245]: AVC avc: denied { write } for pid=2245 comm="tee" name="fd" dev="proc" ino=21871 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:23:28.351000 audit[2245]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc55437a15 a2=241 a3=1b6 items=1 ppid=2187 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.351000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 15:23:28.351000 audit: PATH item=0 name="/dev/fd/63" inode=21844 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:23:28.358000 audit[2241]: AVC avc: denied { write } for pid=2241 comm="tee" name="fd" dev="proc" ino=21363 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:23:28.360000 audit[2243]: AVC avc: denied { write } for pid=2243 comm="tee" name="fd" dev="proc" ino=21366 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:23:28.351000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:23:28.362000 audit[2251]: AVC avc: denied { write } for pid=2251 comm="tee" name="fd" dev="proc" ino=21876 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:23:28.363000 audit[2237]: AVC avc: denied { write } for pid=2237 comm="tee" name="fd" dev="proc" ino=21369 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:23:28.362000 audit[2251]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc12ed0a14 a2=241 a3=1b6 items=1 ppid=2186 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.362000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 15:23:28.362000 audit: PATH item=0 name="/dev/fd/63" inode=21353 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:23:28.362000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:23:28.367000 audit[2259]: AVC avc: denied { write } for pid=2259 comm="tee" name="fd" dev="proc" ino=21373 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:23:28.363000 audit[2237]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe7a96a14 a2=241 a3=1b6 items=1 ppid=2196 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.363000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 15:23:28.363000 audit: PATH item=0 name="/dev/fd/63" inode=21841 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:23:28.363000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:23:28.358000 audit[2241]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff81d29a05 a2=241 a3=1b6 items=1 ppid=2193 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.358000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 15:23:28.358000 audit: PATH item=0 name="/dev/fd/63" inode=21341 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:23:28.358000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:23:28.360000 audit[2243]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef21eba04 a2=241 a3=1b6 items=1 ppid=2190 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.360000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 15:23:28.360000 audit: PATH item=0 name="/dev/fd/63" inode=21344 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:23:28.360000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:23:28.374000 audit[2247]: AVC avc: denied { write } for pid=2247 comm="tee" name="fd" dev="proc" ino=21380 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:23:28.374000 audit[2247]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2f813a14 a2=241 a3=1b6 items=1 ppid=2197 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.367000 audit[2259]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd526eda16 a2=241 a3=1b6 items=1 ppid=2194 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.367000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 15:23:28.367000 audit: PATH item=0 name="/dev/fd/63" inode=21873 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:23:28.367000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:23:28.374000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 15:23:28.374000 audit: PATH item=0 name="/dev/fd/63" inode=21349 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:23:28.374000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:23:28.568000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.568000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.568000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.568000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.568000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.568000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.568000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.568000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.568000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.568000 audit: BPF prog-id=81 op=LOAD Dec 13 15:23:28.568000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd85ff760 a2=98 a3=3 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.568000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.569000 audit: BPF prog-id=81 op=UNLOAD Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit: BPF prog-id=82 op=LOAD Dec 13 15:23:28.570000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd85ff540 a2=74 a3=540051 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.570000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.570000 audit: BPF prog-id=82 op=UNLOAD Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.570000 audit: BPF prog-id=83 op=LOAD Dec 13 15:23:28.570000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd85ff570 a2=94 a3=2 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.570000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.571000 audit: BPF prog-id=83 op=UNLOAD Dec 13 15:23:28.704000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.704000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.704000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.704000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.704000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.704000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.704000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.704000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.704000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.704000 audit: BPF prog-id=84 op=LOAD Dec 13 15:23:28.704000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd85ff430 a2=40 a3=1 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.704000 audit: BPF prog-id=84 op=UNLOAD Dec 13 15:23:28.704000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.704000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdd85ff500 a2=50 a3=7ffdd85ff5e0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.716000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.716000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd85ff440 a2=28 a3=0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.716000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.716000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.716000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd85ff470 a2=28 a3=0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.716000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.716000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.716000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd85ff380 a2=28 a3=0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.716000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.717000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.717000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd85ff490 a2=28 a3=0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.717000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.717000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.717000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd85ff470 a2=28 a3=0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.717000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.717000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.717000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd85ff460 a2=28 a3=0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.717000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.717000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.717000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd85ff490 a2=28 a3=0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.717000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.717000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.717000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd85ff470 a2=28 a3=0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.717000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.717000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.717000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd85ff490 a2=28 a3=0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.717000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.717000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.717000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd85ff460 a2=28 a3=0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.717000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.718000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.718000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd85ff4d0 a2=28 a3=0 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.718000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.718000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.718000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdd85ff280 a2=50 a3=1 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.718000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.718000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.718000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.718000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.718000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.718000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.718000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.718000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.718000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.718000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.718000 audit: BPF prog-id=85 op=LOAD Dec 13 15:23:28.718000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd85ff280 a2=94 a3=5 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.718000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.719000 audit: BPF prog-id=85 op=UNLOAD Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdd85ff330 a2=50 a3=1 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdd85ff450 a2=4 a3=38 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.719000 audit[2298]: AVC avc: denied { confidentiality } for pid=2298 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:23:28.719000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd85ff4a0 a2=94 a3=6 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.720000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.720000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.720000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.720000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.720000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.720000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.720000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.720000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.720000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.720000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.720000 audit[2298]: AVC avc: denied { confidentiality } for pid=2298 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:23:28.720000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd85fec50 a2=94 a3=83 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.720000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.721000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.721000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.721000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.721000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.721000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.721000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.721000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.721000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.721000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.721000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.721000 audit[2298]: AVC avc: denied { confidentiality } for pid=2298 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:23:28.721000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd85fec50 a2=94 a3=83 items=0 ppid=2188 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.721000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit: BPF prog-id=86 op=LOAD Dec 13 15:23:28.734000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff440a2d0 a2=98 a3=1999999999999999 items=0 ppid=2188 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.734000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:23:28.734000 audit: BPF prog-id=86 op=UNLOAD Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.734000 audit: BPF prog-id=87 op=LOAD Dec 13 15:23:28.734000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff440a1b0 a2=74 a3=ffff items=0 ppid=2188 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.734000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:23:28.735000 audit: BPF prog-id=87 op=UNLOAD Dec 13 15:23:28.735000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.735000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.735000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.735000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.735000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.735000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.735000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.735000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.735000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.735000 audit: BPF prog-id=88 op=LOAD Dec 13 15:23:28.735000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff440a1f0 a2=40 a3=7ffff440a3d0 items=0 ppid=2188 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.735000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:23:28.736000 audit: BPF prog-id=88 op=UNLOAD Dec 13 15:23:28.825992 systemd-networkd[1029]: vxlan.calico: Link UP Dec 13 15:23:28.825999 systemd-networkd[1029]: vxlan.calico: Gained carrier Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit: BPF prog-id=89 op=LOAD Dec 13 15:23:28.864000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce300c6d0 a2=98 a3=ffffffff items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.864000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.864000 audit: BPF prog-id=89 op=UNLOAD Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit: BPF prog-id=90 op=LOAD Dec 13 15:23:28.864000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce300c4e0 a2=74 a3=540051 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.864000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.864000 audit: BPF prog-id=90 op=UNLOAD Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit: BPF prog-id=91 op=LOAD Dec 13 15:23:28.864000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce300c510 a2=94 a3=2 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.864000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.864000 audit: BPF prog-id=91 op=UNLOAD Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce300c3e0 a2=28 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.864000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce300c410 a2=28 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.864000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce300c320 a2=28 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.864000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce300c430 a2=28 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.864000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce300c410 a2=28 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.864000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.864000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.864000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce300c400 a2=28 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.864000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce300c430 a2=28 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce300c410 a2=28 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce300c430 a2=28 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce300c400 a2=28 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce300c470 a2=28 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit: BPF prog-id=92 op=LOAD Dec 13 15:23:28.865000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffce300c2e0 a2=40 a3=0 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.865000 audit: BPF prog-id=92 op=UNLOAD Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffce300c2d0 a2=50 a3=2800 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffce300c2d0 a2=50 a3=2800 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit: BPF prog-id=93 op=LOAD Dec 13 15:23:28.865000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffce300baf0 a2=94 a3=2 items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.865000 audit: BPF prog-id=93 op=UNLOAD Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.865000 audit: BPF prog-id=94 op=LOAD Dec 13 15:23:28.865000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffce300bbf0 a2=94 a3=2d items=0 ppid=2188 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.865000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit: BPF prog-id=95 op=LOAD Dec 13 15:23:28.872000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb2da5500 a2=98 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:28.872000 audit: BPF prog-id=95 op=UNLOAD Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit: BPF prog-id=96 op=LOAD Dec 13 15:23:28.872000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb2da52e0 a2=74 a3=540051 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:28.872000 audit: BPF prog-id=96 op=UNLOAD Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:28.872000 audit: BPF prog-id=97 op=LOAD Dec 13 15:23:28.872000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb2da5310 a2=94 a3=2 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:28.872000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:28.873000 audit: BPF prog-id=97 op=UNLOAD Dec 13 15:23:29.008000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.008000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.008000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.008000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.008000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.008000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.008000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.008000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.008000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.008000 audit: BPF prog-id=98 op=LOAD Dec 13 15:23:29.008000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb2da51d0 a2=40 a3=1 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.008000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.008000 audit: BPF prog-id=98 op=UNLOAD Dec 13 15:23:29.008000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.008000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcb2da52a0 a2=50 a3=7ffcb2da5380 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.008000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.030000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.030000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb2da51e0 a2=28 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.030000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.030000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb2da5210 a2=28 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.030000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.030000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb2da5120 a2=28 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.031000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.031000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb2da5230 a2=28 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.031000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.031000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb2da5210 a2=28 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.031000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.031000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb2da5200 a2=28 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.031000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.031000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb2da5230 a2=28 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.031000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.031000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb2da5210 a2=28 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.031000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.031000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb2da5230 a2=28 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.031000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.031000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb2da5200 a2=28 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.032000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.032000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb2da5270 a2=28 a3=0 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.032000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.032000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.032000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcb2da5020 a2=50 a3=1 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.032000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.032000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.032000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.032000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.032000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.032000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.032000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.032000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.032000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.032000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.032000 audit: BPF prog-id=99 op=LOAD Dec 13 15:23:29.032000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcb2da5020 a2=94 a3=5 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.032000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.033000 audit: BPF prog-id=99 op=UNLOAD Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcb2da50d0 a2=50 a3=1 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcb2da51f0 a2=4 a3=38 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.033000 audit[2348]: AVC avc: denied { confidentiality } for pid=2348 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:23:29.033000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb2da5240 a2=94 a3=6 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.034000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.034000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.034000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.034000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.034000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.034000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.034000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.034000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.034000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.034000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.034000 audit[2348]: AVC avc: denied { confidentiality } for pid=2348 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:23:29.034000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb2da49f0 a2=94 a3=83 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.035000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.035000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.035000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.035000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.035000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.035000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.035000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.035000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.035000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.035000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.035000 audit[2348]: AVC avc: denied { confidentiality } for pid=2348 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:23:29.035000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb2da49f0 a2=94 a3=83 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.036000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.036000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb2da6430 a2=10 a3=f1f00800 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.036000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.037000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.037000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb2da62d0 a2=10 a3=3 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.037000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.037000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.037000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb2da6270 a2=10 a3=3 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.037000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.037000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:29.037000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb2da6270 a2=10 a3=7 items=0 ppid=2188 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.037000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:23:29.047000 audit: BPF prog-id=94 op=UNLOAD Dec 13 15:23:29.090961 kubelet[1514]: E1213 15:23:29.090766 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:29.124000 audit[2382]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:23:29.124000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe722b7af0 a2=0 a3=7ffe722b7adc items=0 ppid=2188 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.124000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:23:29.135000 audit[2383]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:23:29.135000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe51f40730 a2=0 a3=7ffe51f4071c items=0 ppid=2188 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.135000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:23:29.138000 audit[2387]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:23:29.138000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd13a85ae0 a2=0 a3=7ffd13a85acc items=0 ppid=2188 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.138000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:23:29.141000 audit[2381]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:23:29.141000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd9e983070 a2=0 a3=7ffd9e98305c items=0 ppid=2188 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:29.141000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:23:29.876521 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL Dec 13 15:23:30.091735 kubelet[1514]: E1213 15:23:30.091629 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:30.247022 env[1197]: time="2024-12-13T15:23:30.245964400Z" level=info msg="StopPodSandbox for \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\"" Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.330 [INFO][2410] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.330 [INFO][2410] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" iface="eth0" netns="/var/run/netns/cni-5e3d905c-7a4a-331a-1c32-15f972767e73" Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.331 [INFO][2410] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" iface="eth0" netns="/var/run/netns/cni-5e3d905c-7a4a-331a-1c32-15f972767e73" Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.331 [INFO][2410] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" iface="eth0" netns="/var/run/netns/cni-5e3d905c-7a4a-331a-1c32-15f972767e73" Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.331 [INFO][2410] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.331 [INFO][2410] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.414 [INFO][2418] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" HandleID="k8s-pod-network.7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.415 [INFO][2418] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.415 [INFO][2418] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.427 [WARNING][2418] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" HandleID="k8s-pod-network.7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.427 [INFO][2418] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" HandleID="k8s-pod-network.7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.429 [INFO][2418] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:30.435225 env[1197]: 2024-12-13 15:23:30.433 [INFO][2410] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:23:30.440587 env[1197]: time="2024-12-13T15:23:30.440542599Z" level=info msg="TearDown network for sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\" successfully" Dec 13 15:23:30.440717 env[1197]: time="2024-12-13T15:23:30.440694113Z" level=info msg="StopPodSandbox for \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\" returns successfully" Dec 13 15:23:30.441748 systemd[1]: run-netns-cni\x2d5e3d905c\x2d7a4a\x2d331a\x2d1c32\x2d15f972767e73.mount: Deactivated successfully. Dec 13 15:23:30.442524 env[1197]: time="2024-12-13T15:23:30.442492022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttxwp,Uid:ef1b7ee7-8a52-46a6-99ac-df9c05563ef4,Namespace:calico-system,Attempt:1,}" Dec 13 15:23:30.639419 systemd-networkd[1029]: cali6fb43c0c814: Link UP Dec 13 15:23:30.641224 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:23:30.641306 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6fb43c0c814: link becomes ready Dec 13 15:23:30.642455 systemd-networkd[1029]: cali6fb43c0c814: Gained carrier Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.509 [INFO][2424] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.97.150-k8s-csi--node--driver--ttxwp-eth0 csi-node-driver- calico-system ef1b7ee7-8a52-46a6-99ac-df9c05563ef4 1238 0 2024-12-13 15:23:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.244.97.150 csi-node-driver-ttxwp eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6fb43c0c814 [] []}} ContainerID="6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" Namespace="calico-system" Pod="csi-node-driver-ttxwp" WorkloadEndpoint="10.244.97.150-k8s-csi--node--driver--ttxwp-" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.509 [INFO][2424] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" Namespace="calico-system" Pod="csi-node-driver-ttxwp" WorkloadEndpoint="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.558 [INFO][2437] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" HandleID="k8s-pod-network.6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.573 [INFO][2437] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" HandleID="k8s-pod-network.6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004e0800), Attrs:map[string]string{"namespace":"calico-system", "node":"10.244.97.150", "pod":"csi-node-driver-ttxwp", "timestamp":"2024-12-13 15:23:30.558712103 +0000 UTC"}, Hostname:"10.244.97.150", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.573 [INFO][2437] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.573 [INFO][2437] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.573 [INFO][2437] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.97.150' Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.576 [INFO][2437] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" host="10.244.97.150" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.584 [INFO][2437] ipam/ipam.go 372: Looking up existing affinities for host host="10.244.97.150" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.593 [INFO][2437] ipam/ipam.go 489: Trying affinity for 192.168.31.192/26 host="10.244.97.150" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.596 [INFO][2437] ipam/ipam.go 155: Attempting to load block cidr=192.168.31.192/26 host="10.244.97.150" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.601 [INFO][2437] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.31.192/26 host="10.244.97.150" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.601 [INFO][2437] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.31.192/26 handle="k8s-pod-network.6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" host="10.244.97.150" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.607 [INFO][2437] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8 Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.616 [INFO][2437] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.31.192/26 handle="k8s-pod-network.6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" host="10.244.97.150" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.629 [INFO][2437] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.31.193/26] block=192.168.31.192/26 handle="k8s-pod-network.6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" host="10.244.97.150" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.629 [INFO][2437] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.31.193/26] handle="k8s-pod-network.6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" host="10.244.97.150" Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.629 [INFO][2437] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:30.660730 env[1197]: 2024-12-13 15:23:30.629 [INFO][2437] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.31.193/26] IPv6=[] ContainerID="6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" HandleID="k8s-pod-network.6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:23:30.661849 env[1197]: 2024-12-13 15:23:30.634 [INFO][2424] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" Namespace="calico-system" Pod="csi-node-driver-ttxwp" WorkloadEndpoint="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-csi--node--driver--ttxwp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef1b7ee7-8a52-46a6-99ac-df9c05563ef4", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 23, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"", Pod:"csi-node-driver-ttxwp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.31.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6fb43c0c814", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:30.661849 env[1197]: 2024-12-13 15:23:30.634 [INFO][2424] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.31.193/32] ContainerID="6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" Namespace="calico-system" Pod="csi-node-driver-ttxwp" WorkloadEndpoint="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:23:30.661849 env[1197]: 2024-12-13 15:23:30.634 [INFO][2424] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6fb43c0c814 ContainerID="6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" Namespace="calico-system" Pod="csi-node-driver-ttxwp" WorkloadEndpoint="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:23:30.661849 env[1197]: 2024-12-13 15:23:30.643 [INFO][2424] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" Namespace="calico-system" Pod="csi-node-driver-ttxwp" WorkloadEndpoint="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:23:30.661849 env[1197]: 2024-12-13 15:23:30.644 [INFO][2424] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" Namespace="calico-system" Pod="csi-node-driver-ttxwp" WorkloadEndpoint="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-csi--node--driver--ttxwp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef1b7ee7-8a52-46a6-99ac-df9c05563ef4", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 23, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8", Pod:"csi-node-driver-ttxwp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.31.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6fb43c0c814", MAC:"ae:c2:dc:d0:f8:0f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:30.661849 env[1197]: 2024-12-13 15:23:30.656 [INFO][2424] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8" Namespace="calico-system" Pod="csi-node-driver-ttxwp" WorkloadEndpoint="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:23:30.674000 audit[2456]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:23:30.674000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcc03cdc40 a2=0 a3=7ffcc03cdc2c items=0 ppid=2188 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:30.674000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:23:30.683269 env[1197]: time="2024-12-13T15:23:30.683170586Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:23:30.683435 env[1197]: time="2024-12-13T15:23:30.683241682Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:23:30.683435 env[1197]: time="2024-12-13T15:23:30.683263759Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:23:30.683683 env[1197]: time="2024-12-13T15:23:30.683623874Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8 pid=2465 runtime=io.containerd.runc.v2 Dec 13 15:23:30.705274 systemd[1]: Started cri-containerd-6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8.scope. Dec 13 15:23:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.728000 audit: BPF prog-id=100 op=LOAD Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2465 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:30.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665313964613863326533363637613837383436313064323163626131 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2465 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:30.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665313964613863326533363637613837383436313064323163626131 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit: BPF prog-id=101 op=LOAD Dec 13 15:23:30.729000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00032d070 items=0 ppid=2465 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:30.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665313964613863326533363637613837383436313064323163626131 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit: BPF prog-id=102 op=LOAD Dec 13 15:23:30.729000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00032d0b8 items=0 ppid=2465 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:30.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665313964613863326533363637613837383436313064323163626131 Dec 13 15:23:30.729000 audit: BPF prog-id=102 op=UNLOAD Dec 13 15:23:30.729000 audit: BPF prog-id=101 op=UNLOAD Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:30.729000 audit: BPF prog-id=103 op=LOAD Dec 13 15:23:30.729000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00032d4c8 items=0 ppid=2465 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:30.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665313964613863326533363637613837383436313064323163626131 Dec 13 15:23:30.748131 env[1197]: time="2024-12-13T15:23:30.748097725Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttxwp,Uid:ef1b7ee7-8a52-46a6-99ac-df9c05563ef4,Namespace:calico-system,Attempt:1,} returns sandbox id \"6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8\"" Dec 13 15:23:30.752870 env[1197]: time="2024-12-13T15:23:30.752379013Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 15:23:31.092326 kubelet[1514]: E1213 15:23:31.092279 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:31.438657 systemd[1]: run-containerd-runc-k8s.io-6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8-runc.9rUz83.mount: Deactivated successfully. Dec 13 15:23:31.796692 systemd-networkd[1029]: cali6fb43c0c814: Gained IPv6LL Dec 13 15:23:32.093165 kubelet[1514]: E1213 15:23:32.092892 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:32.511719 env[1197]: time="2024-12-13T15:23:32.511623005Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:32.513525 env[1197]: time="2024-12-13T15:23:32.513470570Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:32.515672 env[1197]: time="2024-12-13T15:23:32.515625046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:32.517599 env[1197]: time="2024-12-13T15:23:32.517552467Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:32.518243 env[1197]: time="2024-12-13T15:23:32.518190360Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 15:23:32.522277 env[1197]: time="2024-12-13T15:23:32.522226509Z" level=info msg="CreateContainer within sandbox \"6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 15:23:32.532172 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1760388020.mount: Deactivated successfully. Dec 13 15:23:32.541613 env[1197]: time="2024-12-13T15:23:32.541564609Z" level=info msg="CreateContainer within sandbox \"6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"77965bd4ee5da042c098894d23f02500a52d3606e3b051c22487fb371488b95f\"" Dec 13 15:23:32.542452 env[1197]: time="2024-12-13T15:23:32.542419459Z" level=info msg="StartContainer for \"77965bd4ee5da042c098894d23f02500a52d3606e3b051c22487fb371488b95f\"" Dec 13 15:23:32.567236 systemd[1]: Started cri-containerd-77965bd4ee5da042c098894d23f02500a52d3606e3b051c22487fb371488b95f.scope. Dec 13 15:23:32.594000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.600395 kernel: kauditd_printk_skb: 608 callbacks suppressed Dec 13 15:23:32.600481 kernel: audit: type=1400 audit(1734103412.594:661): avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.594000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f742d19f928 items=0 ppid=2465 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:32.606435 kernel: audit: type=1300 audit(1734103412.594:661): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f742d19f928 items=0 ppid=2465 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:32.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393635626434656535646130343263303938383934643233663032 Dec 13 15:23:32.610162 kernel: audit: type=1327 audit(1734103412.594:661): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393635626434656535646130343263303938383934643233663032 Dec 13 15:23:32.610240 kernel: audit: type=1400 audit(1734103412.598:662): avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.598000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.598000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.615564 kernel: audit: type=1400 audit(1734103412.598:662): avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.598000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.618369 kernel: audit: type=1400 audit(1734103412.598:662): avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.618427 kernel: audit: type=1400 audit(1734103412.598:662): avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.598000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.598000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.624014 kernel: audit: type=1400 audit(1734103412.598:662): avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.598000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.598000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.630111 kernel: audit: type=1400 audit(1734103412.598:662): avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.630215 kernel: audit: type=1400 audit(1734103412.598:662): avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.598000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.598000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.598000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.598000 audit: BPF prog-id=104 op=LOAD Dec 13 15:23:32.598000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e4278 items=0 ppid=2465 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:32.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393635626434656535646130343263303938383934643233663032 Dec 13 15:23:32.605000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.605000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.605000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.605000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.605000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.605000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.605000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.605000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.605000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.605000 audit: BPF prog-id=105 op=LOAD Dec 13 15:23:32.605000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e42c8 items=0 ppid=2465 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:32.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393635626434656535646130343263303938383934643233663032 Dec 13 15:23:32.614000 audit: BPF prog-id=105 op=UNLOAD Dec 13 15:23:32.614000 audit: BPF prog-id=104 op=UNLOAD Dec 13 15:23:32.614000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.614000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.614000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.614000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.614000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.614000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.614000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.614000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.614000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.614000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:32.614000 audit: BPF prog-id=106 op=LOAD Dec 13 15:23:32.614000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e4358 items=0 ppid=2465 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:32.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393635626434656535646130343263303938383934643233663032 Dec 13 15:23:32.649105 env[1197]: time="2024-12-13T15:23:32.649062226Z" level=info msg="StartContainer for \"77965bd4ee5da042c098894d23f02500a52d3606e3b051c22487fb371488b95f\" returns successfully" Dec 13 15:23:32.651572 env[1197]: time="2024-12-13T15:23:32.651541531Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 15:23:33.094302 kubelet[1514]: E1213 15:23:33.094120 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:34.095189 kubelet[1514]: E1213 15:23:34.095090 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:34.251923 env[1197]: time="2024-12-13T15:23:34.251880759Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:34.253988 env[1197]: time="2024-12-13T15:23:34.253957182Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:34.255604 env[1197]: time="2024-12-13T15:23:34.255579392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:34.257068 env[1197]: time="2024-12-13T15:23:34.257045678Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:34.257679 env[1197]: time="2024-12-13T15:23:34.257655453Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 15:23:34.261405 env[1197]: time="2024-12-13T15:23:34.261329225Z" level=info msg="CreateContainer within sandbox \"6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 15:23:34.275516 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3756661628.mount: Deactivated successfully. Dec 13 15:23:34.278042 env[1197]: time="2024-12-13T15:23:34.278001689Z" level=info msg="CreateContainer within sandbox \"6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f0331b011f868445ebbd34ac4354ab060fd2a0d6b9b650b0296f8456794002db\"" Dec 13 15:23:34.279366 env[1197]: time="2024-12-13T15:23:34.279338668Z" level=info msg="StartContainer for \"f0331b011f868445ebbd34ac4354ab060fd2a0d6b9b650b0296f8456794002db\"" Dec 13 15:23:34.308832 systemd[1]: Started cri-containerd-f0331b011f868445ebbd34ac4354ab060fd2a0d6b9b650b0296f8456794002db.scope. Dec 13 15:23:34.331000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.331000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f506862ec28 items=0 ppid=2465 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:34.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630333331623031316638363834343565626264333461633433353461 Dec 13 15:23:34.331000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.331000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.331000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.331000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.331000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.331000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.331000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.331000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.331000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.331000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.331000 audit: BPF prog-id=107 op=LOAD Dec 13 15:23:34.331000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001bf308 items=0 ppid=2465 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:34.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630333331623031316638363834343565626264333461633433353461 Dec 13 15:23:34.332000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.332000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.332000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.332000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.332000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.332000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.332000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.332000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.332000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.332000 audit: BPF prog-id=108 op=LOAD Dec 13 15:23:34.332000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001bf358 items=0 ppid=2465 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:34.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630333331623031316638363834343565626264333461633433353461 Dec 13 15:23:34.332000 audit: BPF prog-id=108 op=UNLOAD Dec 13 15:23:34.332000 audit: BPF prog-id=107 op=UNLOAD Dec 13 15:23:34.333000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.333000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.333000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.333000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.333000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.333000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.333000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.333000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.333000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.333000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:34.333000 audit: BPF prog-id=109 op=LOAD Dec 13 15:23:34.333000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001bf3e8 items=0 ppid=2465 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:34.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630333331623031316638363834343565626264333461633433353461 Dec 13 15:23:34.358106 env[1197]: time="2024-12-13T15:23:34.358013420Z" level=info msg="StartContainer for \"f0331b011f868445ebbd34ac4354ab060fd2a0d6b9b650b0296f8456794002db\" returns successfully" Dec 13 15:23:35.096489 kubelet[1514]: E1213 15:23:35.096409 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:35.184652 kubelet[1514]: I1213 15:23:35.184554 1514 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 15:23:35.184950 kubelet[1514]: I1213 15:23:35.184683 1514 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 15:23:35.366901 kubelet[1514]: I1213 15:23:35.366580 1514 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-ttxwp" podStartSLOduration=27.858636336 podStartE2EDuration="31.366459967s" podCreationTimestamp="2024-12-13 15:23:04 +0000 UTC" firstStartedPulling="2024-12-13 15:23:30.751542108 +0000 UTC m=+27.193965355" lastFinishedPulling="2024-12-13 15:23:34.25936569 +0000 UTC m=+30.701788986" observedRunningTime="2024-12-13 15:23:35.364173288 +0000 UTC m=+31.806596580" watchObservedRunningTime="2024-12-13 15:23:35.366459967 +0000 UTC m=+31.808883332" Dec 13 15:23:36.098310 kubelet[1514]: E1213 15:23:36.098230 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:37.100179 kubelet[1514]: E1213 15:23:37.100104 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:38.101458 kubelet[1514]: E1213 15:23:38.101366 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:39.101755 kubelet[1514]: E1213 15:23:39.101655 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:39.243282 env[1197]: time="2024-12-13T15:23:39.243169017Z" level=info msg="StopPodSandbox for \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\"" Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.309 [INFO][2601] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.310 [INFO][2601] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" iface="eth0" netns="/var/run/netns/cni-c2ba7a6f-696d-15ca-1619-c12b19f7c3a5" Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.310 [INFO][2601] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" iface="eth0" netns="/var/run/netns/cni-c2ba7a6f-696d-15ca-1619-c12b19f7c3a5" Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.311 [INFO][2601] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" iface="eth0" netns="/var/run/netns/cni-c2ba7a6f-696d-15ca-1619-c12b19f7c3a5" Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.311 [INFO][2601] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.311 [INFO][2601] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.341 [INFO][2608] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" HandleID="k8s-pod-network.01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.341 [INFO][2608] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.342 [INFO][2608] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.351 [WARNING][2608] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" HandleID="k8s-pod-network.01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.351 [INFO][2608] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" HandleID="k8s-pod-network.01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.371 [INFO][2608] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:39.375529 env[1197]: 2024-12-13 15:23:39.373 [INFO][2601] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:23:39.380437 env[1197]: time="2024-12-13T15:23:39.376146419Z" level=info msg="TearDown network for sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\" successfully" Dec 13 15:23:39.380437 env[1197]: time="2024-12-13T15:23:39.376225420Z" level=info msg="StopPodSandbox for \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\" returns successfully" Dec 13 15:23:39.380437 env[1197]: time="2024-12-13T15:23:39.379158577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-h86rq,Uid:78b4e62d-4560-402e-937c-98d906817bb4,Namespace:default,Attempt:1,}" Dec 13 15:23:39.380658 systemd[1]: run-netns-cni\x2dc2ba7a6f\x2d696d\x2d15ca\x2d1619\x2dc12b19f7c3a5.mount: Deactivated successfully. Dec 13 15:23:39.531915 systemd-networkd[1029]: calie1711d6a93b: Link UP Dec 13 15:23:39.539907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:23:39.540151 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie1711d6a93b: link becomes ready Dec 13 15:23:39.540006 systemd-networkd[1029]: calie1711d6a93b: Gained carrier Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.431 [INFO][2615] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0 nginx-deployment-85f456d6dd- default 78b4e62d-4560-402e-937c-98d906817bb4 1273 0 2024-12-13 15:23:22 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.244.97.150 nginx-deployment-85f456d6dd-h86rq eth0 default [] [] [kns.default ksa.default.default] calie1711d6a93b [] []}} ContainerID="5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" Namespace="default" Pod="nginx-deployment-85f456d6dd-h86rq" WorkloadEndpoint="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.431 [INFO][2615] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" Namespace="default" Pod="nginx-deployment-85f456d6dd-h86rq" WorkloadEndpoint="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.466 [INFO][2627] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" HandleID="k8s-pod-network.5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.481 [INFO][2627] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" HandleID="k8s-pod-network.5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318ae0), Attrs:map[string]string{"namespace":"default", "node":"10.244.97.150", "pod":"nginx-deployment-85f456d6dd-h86rq", "timestamp":"2024-12-13 15:23:39.466530781 +0000 UTC"}, Hostname:"10.244.97.150", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.481 [INFO][2627] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.481 [INFO][2627] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.481 [INFO][2627] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.97.150' Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.484 [INFO][2627] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" host="10.244.97.150" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.491 [INFO][2627] ipam/ipam.go 372: Looking up existing affinities for host host="10.244.97.150" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.498 [INFO][2627] ipam/ipam.go 489: Trying affinity for 192.168.31.192/26 host="10.244.97.150" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.502 [INFO][2627] ipam/ipam.go 155: Attempting to load block cidr=192.168.31.192/26 host="10.244.97.150" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.506 [INFO][2627] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.31.192/26 host="10.244.97.150" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.506 [INFO][2627] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.31.192/26 handle="k8s-pod-network.5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" host="10.244.97.150" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.509 [INFO][2627] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96 Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.516 [INFO][2627] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.31.192/26 handle="k8s-pod-network.5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" host="10.244.97.150" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.523 [INFO][2627] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.31.194/26] block=192.168.31.192/26 handle="k8s-pod-network.5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" host="10.244.97.150" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.523 [INFO][2627] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.31.194/26] handle="k8s-pod-network.5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" host="10.244.97.150" Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.523 [INFO][2627] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:39.570869 env[1197]: 2024-12-13 15:23:39.523 [INFO][2627] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.31.194/26] IPv6=[] ContainerID="5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" HandleID="k8s-pod-network.5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:23:39.571712 env[1197]: 2024-12-13 15:23:39.525 [INFO][2615] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" Namespace="default" Pod="nginx-deployment-85f456d6dd-h86rq" WorkloadEndpoint="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"78b4e62d-4560-402e-937c-98d906817bb4", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 23, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-h86rq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie1711d6a93b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:39.571712 env[1197]: 2024-12-13 15:23:39.526 [INFO][2615] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.31.194/32] ContainerID="5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" Namespace="default" Pod="nginx-deployment-85f456d6dd-h86rq" WorkloadEndpoint="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:23:39.571712 env[1197]: 2024-12-13 15:23:39.526 [INFO][2615] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie1711d6a93b ContainerID="5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" Namespace="default" Pod="nginx-deployment-85f456d6dd-h86rq" WorkloadEndpoint="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:23:39.571712 env[1197]: 2024-12-13 15:23:39.542 [INFO][2615] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" Namespace="default" Pod="nginx-deployment-85f456d6dd-h86rq" WorkloadEndpoint="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:23:39.571712 env[1197]: 2024-12-13 15:23:39.543 [INFO][2615] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" Namespace="default" Pod="nginx-deployment-85f456d6dd-h86rq" WorkloadEndpoint="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"78b4e62d-4560-402e-937c-98d906817bb4", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 23, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96", Pod:"nginx-deployment-85f456d6dd-h86rq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie1711d6a93b", MAC:"da:4a:40:01:09:3a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:39.571712 env[1197]: 2024-12-13 15:23:39.565 [INFO][2615] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96" Namespace="default" Pod="nginx-deployment-85f456d6dd-h86rq" WorkloadEndpoint="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:23:39.576000 audit[2645]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:23:39.578855 kernel: kauditd_printk_skb: 76 callbacks suppressed Dec 13 15:23:39.578927 kernel: audit: type=1325 audit(1734103419.576:673): table=filter:70 family=2 entries=38 op=nft_register_chain pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:23:39.576000 audit[2645]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe694ec780 a2=0 a3=7ffe694ec76c items=0 ppid=2188 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:39.594447 kernel: audit: type=1300 audit(1734103419.576:673): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe694ec780 a2=0 a3=7ffe694ec76c items=0 ppid=2188 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:39.594760 kernel: audit: type=1327 audit(1734103419.576:673): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:23:39.576000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:23:39.609473 env[1197]: time="2024-12-13T15:23:39.609397636Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:23:39.609473 env[1197]: time="2024-12-13T15:23:39.609447555Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:23:39.609692 env[1197]: time="2024-12-13T15:23:39.609652414Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:23:39.610005 env[1197]: time="2024-12-13T15:23:39.609968243Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96 pid=2657 runtime=io.containerd.runc.v2 Dec 13 15:23:39.627438 systemd[1]: Started cri-containerd-5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96.scope. Dec 13 15:23:39.661471 kernel: audit: type=1400 audit(1734103419.652:674): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.661625 kernel: audit: type=1400 audit(1734103419.652:675): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.667324 kernel: audit: type=1400 audit(1734103419.652:676): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.667386 kernel: audit: type=1400 audit(1734103419.652:677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.670717 kernel: audit: type=1400 audit(1734103419.652:678): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.670791 kernel: audit: type=1400 audit(1734103419.652:679): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.673500 kernel: audit: type=1400 audit(1734103419.652:680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.653000 audit: BPF prog-id=110 op=LOAD Dec 13 15:23:39.658000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.658000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2657 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:39.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333136613139333464383238396330656331613232373361633066 Dec 13 15:23:39.658000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.658000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2657 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:39.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333136613139333464383238396330656331613232373361633066 Dec 13 15:23:39.659000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.659000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.659000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.659000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.659000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.659000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.659000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.659000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.659000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.659000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.659000 audit: BPF prog-id=111 op=LOAD Dec 13 15:23:39.659000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e4ac0 items=0 ppid=2657 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:39.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333136613139333464383238396330656331613232373361633066 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit: BPF prog-id=112 op=LOAD Dec 13 15:23:39.660000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e4b08 items=0 ppid=2657 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:39.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333136613139333464383238396330656331613232373361633066 Dec 13 15:23:39.660000 audit: BPF prog-id=112 op=UNLOAD Dec 13 15:23:39.660000 audit: BPF prog-id=111 op=UNLOAD Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:39.660000 audit: BPF prog-id=113 op=LOAD Dec 13 15:23:39.660000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e4f18 items=0 ppid=2657 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:39.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333136613139333464383238396330656331613232373361633066 Dec 13 15:23:39.724743 env[1197]: time="2024-12-13T15:23:39.724683695Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-h86rq,Uid:78b4e62d-4560-402e-937c-98d906817bb4,Namespace:default,Attempt:1,} returns sandbox id \"5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96\"" Dec 13 15:23:39.727236 env[1197]: time="2024-12-13T15:23:39.727180336Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 15:23:40.102678 kubelet[1514]: E1213 15:23:40.102619 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:41.103989 kubelet[1514]: E1213 15:23:41.103890 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:41.268015 systemd-networkd[1029]: calie1711d6a93b: Gained IPv6LL Dec 13 15:23:42.104354 kubelet[1514]: E1213 15:23:42.104252 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:43.105321 kubelet[1514]: E1213 15:23:43.105268 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:43.158348 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3727268919.mount: Deactivated successfully. Dec 13 15:23:44.061114 kubelet[1514]: E1213 15:23:44.061066 1514 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:44.106284 kubelet[1514]: E1213 15:23:44.106238 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:44.751324 env[1197]: time="2024-12-13T15:23:44.751231689Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:44.753024 env[1197]: time="2024-12-13T15:23:44.752937382Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:44.755354 env[1197]: time="2024-12-13T15:23:44.755306210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:44.758672 env[1197]: time="2024-12-13T15:23:44.758626816Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:23:44.760860 env[1197]: time="2024-12-13T15:23:44.760780849Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 15:23:44.767324 env[1197]: time="2024-12-13T15:23:44.767261896Z" level=info msg="CreateContainer within sandbox \"5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 15:23:44.782660 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1015512254.mount: Deactivated successfully. Dec 13 15:23:44.786615 env[1197]: time="2024-12-13T15:23:44.786578420Z" level=info msg="CreateContainer within sandbox \"5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"0045a16d1093cfd58671b27fc0e473dd34a785a17926ce2ea3ea49fc5e642019\"" Dec 13 15:23:44.787372 env[1197]: time="2024-12-13T15:23:44.787350375Z" level=info msg="StartContainer for \"0045a16d1093cfd58671b27fc0e473dd34a785a17926ce2ea3ea49fc5e642019\"" Dec 13 15:23:44.818743 systemd[1]: Started cri-containerd-0045a16d1093cfd58671b27fc0e473dd34a785a17926ce2ea3ea49fc5e642019.scope. Dec 13 15:23:44.845101 kernel: kauditd_printk_skb: 50 callbacks suppressed Dec 13 15:23:44.845492 kernel: audit: type=1400 audit(1734103424.838:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.845563 kernel: audit: type=1400 audit(1734103424.838:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.853848 kernel: audit: type=1400 audit(1734103424.838:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.853917 kernel: audit: type=1400 audit(1734103424.838:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.853951 kernel: audit: type=1400 audit(1734103424.838:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.859144 kernel: audit: type=1400 audit(1734103424.838:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.859220 kernel: audit: type=1400 audit(1734103424.838:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.865228 kernel: audit: type=1400 audit(1734103424.838:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.869311 kernel: audit: type=1400 audit(1734103424.838:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.844000 audit: BPF prog-id=114 op=LOAD Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2657 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:44.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030343561313664313039336366643538363731623237666330653437 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2657 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:44.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030343561313664313039336366643538363731623237666330653437 Dec 13 15:23:44.874207 kernel: audit: type=1400 audit(1734103424.844:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit: BPF prog-id=115 op=LOAD Dec 13 15:23:44.846000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00025bed0 items=0 ppid=2657 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:44.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030343561313664313039336366643538363731623237666330653437 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.846000 audit: BPF prog-id=116 op=LOAD Dec 13 15:23:44.846000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00025bf18 items=0 ppid=2657 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:44.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030343561313664313039336366643538363731623237666330653437 Dec 13 15:23:44.847000 audit: BPF prog-id=116 op=UNLOAD Dec 13 15:23:44.847000 audit: BPF prog-id=115 op=UNLOAD Dec 13 15:23:44.847000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.847000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.847000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.847000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.847000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.847000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.847000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.847000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.847000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.847000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:44.847000 audit: BPF prog-id=117 op=LOAD Dec 13 15:23:44.847000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c6328 items=0 ppid=2657 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:44.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030343561313664313039336366643538363731623237666330653437 Dec 13 15:23:44.886462 env[1197]: time="2024-12-13T15:23:44.886425968Z" level=info msg="StartContainer for \"0045a16d1093cfd58671b27fc0e473dd34a785a17926ce2ea3ea49fc5e642019\" returns successfully" Dec 13 15:23:45.107224 kubelet[1514]: E1213 15:23:45.107056 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:45.400337 kubelet[1514]: I1213 15:23:45.400045 1514 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-h86rq" podStartSLOduration=18.362860757 podStartE2EDuration="23.399900388s" podCreationTimestamp="2024-12-13 15:23:22 +0000 UTC" firstStartedPulling="2024-12-13 15:23:39.72662247 +0000 UTC m=+36.169045735" lastFinishedPulling="2024-12-13 15:23:44.76366209 +0000 UTC m=+41.206085366" observedRunningTime="2024-12-13 15:23:45.397920946 +0000 UTC m=+41.840344263" watchObservedRunningTime="2024-12-13 15:23:45.399900388 +0000 UTC m=+41.842323752" Dec 13 15:23:45.777965 systemd[1]: run-containerd-runc-k8s.io-0045a16d1093cfd58671b27fc0e473dd34a785a17926ce2ea3ea49fc5e642019-runc.e9lqwt.mount: Deactivated successfully. Dec 13 15:23:46.108305 kubelet[1514]: E1213 15:23:46.108057 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:47.108999 kubelet[1514]: E1213 15:23:47.108925 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:47.470314 systemd[1]: run-containerd-runc-k8s.io-a624810810c63c4bf0ad917e8c3c6398c5ae5951ba3342469964b80c89435966-runc.usxknx.mount: Deactivated successfully. Dec 13 15:23:48.110274 kubelet[1514]: E1213 15:23:48.110164 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:49.112609 kubelet[1514]: E1213 15:23:49.112466 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:50.112784 kubelet[1514]: E1213 15:23:50.112691 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:51.113020 kubelet[1514]: E1213 15:23:51.112939 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:52.114414 kubelet[1514]: E1213 15:23:52.114335 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:53.115760 kubelet[1514]: E1213 15:23:53.115688 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:54.117964 kubelet[1514]: E1213 15:23:54.117861 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:55.118423 kubelet[1514]: E1213 15:23:55.118324 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:56.119044 kubelet[1514]: E1213 15:23:56.118968 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:57.119772 kubelet[1514]: E1213 15:23:57.119700 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:58.121041 kubelet[1514]: E1213 15:23:58.120964 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:59.042000 audit[2787]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.049644 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 15:23:59.049736 kernel: audit: type=1325 audit(1734103439.042:710): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.042000 audit[2787]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffea1a39220 a2=0 a3=7ffea1a3920c items=0 ppid=1764 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.056301 kernel: audit: type=1300 audit(1734103439.042:710): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffea1a39220 a2=0 a3=7ffea1a3920c items=0 ppid=1764 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.056363 kernel: audit: type=1327 audit(1734103439.042:710): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.058070 kernel: audit: type=1325 audit(1734103439.054:711): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.054000 audit[2787]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.054000 audit[2787]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffea1a39220 a2=0 a3=0 items=0 ppid=1764 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.063864 kernel: audit: type=1300 audit(1734103439.054:711): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffea1a39220 a2=0 a3=0 items=0 ppid=1764 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.063939 kernel: audit: type=1327 audit(1734103439.054:711): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.071000 audit[2792]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.071000 audit[2792]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdebf78ab0 a2=0 a3=7ffdebf78a9c items=0 ppid=1764 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.079659 kernel: audit: type=1325 audit(1734103439.071:712): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.079728 kernel: audit: type=1300 audit(1734103439.071:712): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdebf78ab0 a2=0 a3=7ffdebf78a9c items=0 ppid=1764 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.079765 kernel: audit: type=1327 audit(1734103439.071:712): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.075000 audit[2792]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.084027 kernel: audit: type=1325 audit(1734103439.075:713): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.075000 audit[2792]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdebf78ab0 a2=0 a3=0 items=0 ppid=1764 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.075000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.122814 kubelet[1514]: E1213 15:23:59.122750 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:23:59.143127 kubelet[1514]: I1213 15:23:59.143062 1514 topology_manager.go:215] "Topology Admit Handler" podUID="86783fe7-cd68-4473-bfdc-f25217ed0263" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 15:23:59.154358 systemd[1]: Created slice kubepods-besteffort-pod86783fe7_cd68_4473_bfdc_f25217ed0263.slice. Dec 13 15:23:59.199823 kubelet[1514]: I1213 15:23:59.199746 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/86783fe7-cd68-4473-bfdc-f25217ed0263-data\") pod \"nfs-server-provisioner-0\" (UID: \"86783fe7-cd68-4473-bfdc-f25217ed0263\") " pod="default/nfs-server-provisioner-0" Dec 13 15:23:59.200369 kubelet[1514]: I1213 15:23:59.200327 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-djrwq\" (UniqueName: \"kubernetes.io/projected/86783fe7-cd68-4473-bfdc-f25217ed0263-kube-api-access-djrwq\") pod \"nfs-server-provisioner-0\" (UID: \"86783fe7-cd68-4473-bfdc-f25217ed0263\") " pod="default/nfs-server-provisioner-0" Dec 13 15:23:59.460445 env[1197]: time="2024-12-13T15:23:59.460263996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:86783fe7-cd68-4473-bfdc-f25217ed0263,Namespace:default,Attempt:0,}" Dec 13 15:23:59.648979 systemd-networkd[1029]: cali60e51b789ff: Link UP Dec 13 15:23:59.656440 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:23:59.656819 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 15:23:59.660546 systemd-networkd[1029]: cali60e51b789ff: Gained carrier Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.520 [INFO][2794] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.97.150-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 86783fe7-cd68-4473-bfdc-f25217ed0263 1344 0 2024-12-13 15:23:59 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.244.97.150 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.150-k8s-nfs--server--provisioner--0-" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.520 [INFO][2794] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.150-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.568 [INFO][2806] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" HandleID="k8s-pod-network.f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" Workload="10.244.97.150-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.588 [INFO][2806] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" HandleID="k8s-pod-network.f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" Workload="10.244.97.150-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029f620), Attrs:map[string]string{"namespace":"default", "node":"10.244.97.150", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 15:23:59.5680361 +0000 UTC"}, Hostname:"10.244.97.150", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.588 [INFO][2806] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.588 [INFO][2806] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.589 [INFO][2806] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.97.150' Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.597 [INFO][2806] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" host="10.244.97.150" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.607 [INFO][2806] ipam/ipam.go 372: Looking up existing affinities for host host="10.244.97.150" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.613 [INFO][2806] ipam/ipam.go 489: Trying affinity for 192.168.31.192/26 host="10.244.97.150" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.616 [INFO][2806] ipam/ipam.go 155: Attempting to load block cidr=192.168.31.192/26 host="10.244.97.150" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.619 [INFO][2806] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.31.192/26 host="10.244.97.150" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.619 [INFO][2806] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.31.192/26 handle="k8s-pod-network.f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" host="10.244.97.150" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.622 [INFO][2806] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.629 [INFO][2806] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.31.192/26 handle="k8s-pod-network.f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" host="10.244.97.150" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.640 [INFO][2806] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.31.195/26] block=192.168.31.192/26 handle="k8s-pod-network.f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" host="10.244.97.150" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.640 [INFO][2806] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.31.195/26] handle="k8s-pod-network.f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" host="10.244.97.150" Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.640 [INFO][2806] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:59.692734 env[1197]: 2024-12-13 15:23:59.640 [INFO][2806] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.31.195/26] IPv6=[] ContainerID="f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" HandleID="k8s-pod-network.f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" Workload="10.244.97.150-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:23:59.694775 env[1197]: 2024-12-13 15:23:59.642 [INFO][2794] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.150-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"86783fe7-cd68-4473-bfdc-f25217ed0263", ResourceVersion:"1344", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 23, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.31.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:59.694775 env[1197]: 2024-12-13 15:23:59.642 [INFO][2794] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.31.195/32] ContainerID="f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.150-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:23:59.694775 env[1197]: 2024-12-13 15:23:59.642 [INFO][2794] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.150-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:23:59.694775 env[1197]: 2024-12-13 15:23:59.666 [INFO][2794] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.150-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:23:59.695266 env[1197]: 2024-12-13 15:23:59.673 [INFO][2794] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.150-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"86783fe7-cd68-4473-bfdc-f25217ed0263", ResourceVersion:"1344", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 23, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.31.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"8e:36:77:5b:8c:e5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:59.695266 env[1197]: 2024-12-13 15:23:59.690 [INFO][2794] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.97.150-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:23:59.712000 audit[2827]: NETFILTER_CFG table=filter:75 family=2 entries=44 op=nft_register_chain pid=2827 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:23:59.712000 audit[2827]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffe9cbf50d0 a2=0 a3=7ffe9cbf50bc items=0 ppid=2188 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.712000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:23:59.728155 env[1197]: time="2024-12-13T15:23:59.727879515Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:23:59.728155 env[1197]: time="2024-12-13T15:23:59.727937961Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:23:59.728155 env[1197]: time="2024-12-13T15:23:59.727952192Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:23:59.728668 env[1197]: time="2024-12-13T15:23:59.728245047Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe pid=2836 runtime=io.containerd.runc.v2 Dec 13 15:23:59.745885 systemd[1]: Started cri-containerd-f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe.scope. Dec 13 15:23:59.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit: BPF prog-id=118 op=LOAD Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2836 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631616237376663323431643135366135343865653461363731653336 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2836 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631616237376663323431643135366135343865653461363731653336 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit: BPF prog-id=119 op=LOAD Dec 13 15:23:59.766000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000284810 items=0 ppid=2836 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631616237376663323431643135366135343865653461363731653336 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.766000 audit: BPF prog-id=120 op=LOAD Dec 13 15:23:59.766000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000284858 items=0 ppid=2836 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631616237376663323431643135366135343865653461363731653336 Dec 13 15:23:59.767000 audit: BPF prog-id=120 op=UNLOAD Dec 13 15:23:59.767000 audit: BPF prog-id=119 op=UNLOAD Dec 13 15:23:59.767000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.767000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.767000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.767000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.767000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.767000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.767000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.767000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.767000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.767000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:23:59.767000 audit: BPF prog-id=121 op=LOAD Dec 13 15:23:59.767000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000284c68 items=0 ppid=2836 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631616237376663323431643135366135343865653461363731653336 Dec 13 15:23:59.802722 env[1197]: time="2024-12-13T15:23:59.802653016Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:86783fe7-cd68-4473-bfdc-f25217ed0263,Namespace:default,Attempt:0,} returns sandbox id \"f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe\"" Dec 13 15:23:59.804802 env[1197]: time="2024-12-13T15:23:59.804776376Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 15:24:00.123787 kubelet[1514]: E1213 15:24:00.123605 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:00.323769 systemd[1]: run-containerd-runc-k8s.io-f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe-runc.08qyxd.mount: Deactivated successfully. Dec 13 15:24:00.855875 systemd-networkd[1029]: cali60e51b789ff: Gained IPv6LL Dec 13 15:24:01.125049 kubelet[1514]: E1213 15:24:01.124781 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:02.126098 kubelet[1514]: E1213 15:24:02.125979 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:03.126533 kubelet[1514]: E1213 15:24:03.126419 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:04.061723 kubelet[1514]: E1213 15:24:04.061670 1514 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:04.105953 env[1197]: time="2024-12-13T15:24:04.105915442Z" level=info msg="StopPodSandbox for \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\"" Dec 13 15:24:04.127318 kubelet[1514]: E1213 15:24:04.127204 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:04.200159 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3137238090.mount: Deactivated successfully. Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.165 [WARNING][2884] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-csi--node--driver--ttxwp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef1b7ee7-8a52-46a6-99ac-df9c05563ef4", ResourceVersion:"1263", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 23, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8", Pod:"csi-node-driver-ttxwp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.31.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6fb43c0c814", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.165 [INFO][2884] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.165 [INFO][2884] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" iface="eth0" netns="" Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.165 [INFO][2884] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.166 [INFO][2884] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.197 [INFO][2890] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" HandleID="k8s-pod-network.7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.197 [INFO][2890] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.197 [INFO][2890] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.213 [WARNING][2890] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" HandleID="k8s-pod-network.7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.213 [INFO][2890] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" HandleID="k8s-pod-network.7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.216 [INFO][2890] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:24:04.226587 env[1197]: 2024-12-13 15:24:04.224 [INFO][2884] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:24:04.227766 env[1197]: time="2024-12-13T15:24:04.227727408Z" level=info msg="TearDown network for sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\" successfully" Dec 13 15:24:04.227866 env[1197]: time="2024-12-13T15:24:04.227849081Z" level=info msg="StopPodSandbox for \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\" returns successfully" Dec 13 15:24:04.229763 env[1197]: time="2024-12-13T15:24:04.229727863Z" level=info msg="RemovePodSandbox for \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\"" Dec 13 15:24:04.229865 env[1197]: time="2024-12-13T15:24:04.229769765Z" level=info msg="Forcibly stopping sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\"" Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.309 [WARNING][2912] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-csi--node--driver--ttxwp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef1b7ee7-8a52-46a6-99ac-df9c05563ef4", ResourceVersion:"1263", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 23, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"6e19da8c2e3667a8784610d21cba11d06cfc862861dfd53cc544e75772cb38f8", Pod:"csi-node-driver-ttxwp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.31.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6fb43c0c814", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.309 [INFO][2912] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.309 [INFO][2912] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" iface="eth0" netns="" Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.309 [INFO][2912] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.309 [INFO][2912] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.340 [INFO][2921] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" HandleID="k8s-pod-network.7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.340 [INFO][2921] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.340 [INFO][2921] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.350 [WARNING][2921] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" HandleID="k8s-pod-network.7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.350 [INFO][2921] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" HandleID="k8s-pod-network.7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Workload="10.244.97.150-k8s-csi--node--driver--ttxwp-eth0" Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.353 [INFO][2921] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:24:04.365918 env[1197]: 2024-12-13 15:24:04.364 [INFO][2912] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3" Dec 13 15:24:04.367780 env[1197]: time="2024-12-13T15:24:04.367727983Z" level=info msg="TearDown network for sandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\" successfully" Dec 13 15:24:04.424743 env[1197]: time="2024-12-13T15:24:04.424685210Z" level=info msg="RemovePodSandbox \"7b828abfd53840841415fd33fedf64c3a96e4a733a7a6373784c7c2042c42ac3\" returns successfully" Dec 13 15:24:04.425264 env[1197]: time="2024-12-13T15:24:04.425238697Z" level=info msg="StopPodSandbox for \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\"" Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.519 [WARNING][2941] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"78b4e62d-4560-402e-937c-98d906817bb4", ResourceVersion:"1294", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 23, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96", Pod:"nginx-deployment-85f456d6dd-h86rq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie1711d6a93b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.519 [INFO][2941] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.520 [INFO][2941] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" iface="eth0" netns="" Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.520 [INFO][2941] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.520 [INFO][2941] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.548 [INFO][2947] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" HandleID="k8s-pod-network.01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.549 [INFO][2947] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.549 [INFO][2947] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.557 [WARNING][2947] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" HandleID="k8s-pod-network.01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.557 [INFO][2947] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" HandleID="k8s-pod-network.01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.560 [INFO][2947] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:24:04.564478 env[1197]: 2024-12-13 15:24:04.562 [INFO][2941] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:24:04.565898 env[1197]: time="2024-12-13T15:24:04.564491198Z" level=info msg="TearDown network for sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\" successfully" Dec 13 15:24:04.565898 env[1197]: time="2024-12-13T15:24:04.564524586Z" level=info msg="StopPodSandbox for \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\" returns successfully" Dec 13 15:24:04.565898 env[1197]: time="2024-12-13T15:24:04.565023239Z" level=info msg="RemovePodSandbox for \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\"" Dec 13 15:24:04.565898 env[1197]: time="2024-12-13T15:24:04.565052466Z" level=info msg="Forcibly stopping sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\"" Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.626 [WARNING][2968] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"78b4e62d-4560-402e-937c-98d906817bb4", ResourceVersion:"1294", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 23, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"5b316a1934d8289c0ec1a2273ac0f7b4455cfd3dfd00edaf107b212d53c2bb96", Pod:"nginx-deployment-85f456d6dd-h86rq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie1711d6a93b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.626 [INFO][2968] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.626 [INFO][2968] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" iface="eth0" netns="" Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.626 [INFO][2968] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.626 [INFO][2968] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.668 [INFO][2974] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" HandleID="k8s-pod-network.01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.668 [INFO][2974] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.668 [INFO][2974] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.677 [WARNING][2974] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" HandleID="k8s-pod-network.01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.677 [INFO][2974] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" HandleID="k8s-pod-network.01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Workload="10.244.97.150-k8s-nginx--deployment--85f456d6dd--h86rq-eth0" Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.679 [INFO][2974] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:24:04.684335 env[1197]: 2024-12-13 15:24:04.682 [INFO][2968] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025" Dec 13 15:24:04.685629 env[1197]: time="2024-12-13T15:24:04.685567135Z" level=info msg="TearDown network for sandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\" successfully" Dec 13 15:24:04.688555 env[1197]: time="2024-12-13T15:24:04.688498137Z" level=info msg="RemovePodSandbox \"01246e63f3d26a42f23785410f3958914a9ccfc6c10176727fd647bea4286025\" returns successfully" Dec 13 15:24:05.128162 kubelet[1514]: E1213 15:24:05.128047 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:06.129254 kubelet[1514]: E1213 15:24:06.129147 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:06.530666 env[1197]: time="2024-12-13T15:24:06.530618465Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:24:06.532964 env[1197]: time="2024-12-13T15:24:06.532933455Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:24:06.534953 env[1197]: time="2024-12-13T15:24:06.534928569Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:24:06.536809 env[1197]: time="2024-12-13T15:24:06.536785724Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:24:06.537661 env[1197]: time="2024-12-13T15:24:06.537631711Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 15:24:06.543417 env[1197]: time="2024-12-13T15:24:06.543386313Z" level=info msg="CreateContainer within sandbox \"f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 15:24:06.553767 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4151993462.mount: Deactivated successfully. Dec 13 15:24:06.559143 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3167811113.mount: Deactivated successfully. Dec 13 15:24:06.566410 env[1197]: time="2024-12-13T15:24:06.566358805Z" level=info msg="CreateContainer within sandbox \"f1ab77fc241d156a548ee4a671e3638ef1045efe8cb27e1e96a0251f2be963fe\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"e7d3439e2ee260c3c23224a96046e10e1a965a977bcbe2764a455ff1c3621c59\"" Dec 13 15:24:06.567370 env[1197]: time="2024-12-13T15:24:06.567338067Z" level=info msg="StartContainer for \"e7d3439e2ee260c3c23224a96046e10e1a965a977bcbe2764a455ff1c3621c59\"" Dec 13 15:24:06.602624 systemd[1]: Started cri-containerd-e7d3439e2ee260c3c23224a96046e10e1a965a977bcbe2764a455ff1c3621c59.scope. Dec 13 15:24:06.643558 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 15:24:06.643778 kernel: audit: type=1400 audit(1734103446.637:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.643813 kernel: audit: type=1400 audit(1734103446.637:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.648695 kernel: audit: type=1400 audit(1734103446.637:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.655530 kernel: audit: type=1400 audit(1734103446.637:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.655648 kernel: audit: type=1400 audit(1734103446.637:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.660220 kernel: audit: type=1400 audit(1734103446.637:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.669823 kernel: audit: type=1400 audit(1734103446.637:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.669939 kernel: audit: type=1400 audit(1734103446.637:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.669967 kernel: audit: type=1400 audit(1734103446.637:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.674915 kernel: audit: type=1400 audit(1734103446.646:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.646000 audit: BPF prog-id=122 op=LOAD Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2836 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:06.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643334333965326565323630633363323332323461393630343665 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2836 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:06.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643334333965326565323630633363323332323461393630343665 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit: BPF prog-id=123 op=LOAD Dec 13 15:24:06.649000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000346ba0 items=0 ppid=2836 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:06.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643334333965326565323630633363323332323461393630343665 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit: BPF prog-id=124 op=LOAD Dec 13 15:24:06.649000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000346be8 items=0 ppid=2836 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:06.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643334333965326565323630633363323332323461393630343665 Dec 13 15:24:06.649000 audit: BPF prog-id=124 op=UNLOAD Dec 13 15:24:06.649000 audit: BPF prog-id=123 op=UNLOAD Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:06.649000 audit: BPF prog-id=125 op=LOAD Dec 13 15:24:06.649000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000346ff8 items=0 ppid=2836 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:06.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643334333965326565323630633363323332323461393630343665 Dec 13 15:24:06.689185 env[1197]: time="2024-12-13T15:24:06.689120202Z" level=info msg="StartContainer for \"e7d3439e2ee260c3c23224a96046e10e1a965a977bcbe2764a455ff1c3621c59\" returns successfully" Dec 13 15:24:06.741000 audit[3017]: AVC avc: denied { search } for pid=3017 comm="rpcbind" name="crypto" dev="proc" ino=25023 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c610 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 15:24:06.741000 audit[3017]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f73522490c0 a2=0 a3=0 items=0 ppid=3001 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c610 key=(null) Dec 13 15:24:06.741000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 15:24:06.794000 audit[3023]: AVC avc: denied { search } for pid=3023 comm="dbus-daemon" name="crypto" dev="proc" ino=25023 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c610 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 15:24:06.794000 audit[3023]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f7b40be50c0 a2=0 a3=0 items=0 ppid=3001 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c610 key=(null) Dec 13 15:24:06.794000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 15:24:06.800000 audit[3024]: AVC avc: denied { watch } for pid=3024 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538727 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c610 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c399,c610 tclass=dir permissive=0 Dec 13 15:24:06.800000 audit[3024]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=56247c63b040 a2=2c8 a3=7ffe507d38dc items=0 ppid=3001 pid=3024 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c610 key=(null) Dec 13 15:24:06.800000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 15:24:06.807000 audit[3025]: AVC avc: denied { read } for pid=3025 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c610 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 15:24:06.807000 audit[3025]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fd724377320 a1=80000 a2=d a3=7fff4f7f3950 items=0 ppid=3001 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c610 key=(null) Dec 13 15:24:06.807000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 15:24:06.809000 audit[3025]: AVC avc: denied { search } for pid=3025 comm="ganesha.nfsd" name="crypto" dev="proc" ino=25023 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c610 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 15:24:06.809000 audit[3025]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fd7238cb0c0 a2=0 a3=0 items=0 ppid=3001 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c610 key=(null) Dec 13 15:24:06.809000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 15:24:07.129824 kubelet[1514]: E1213 15:24:07.129518 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:07.488852 kubelet[1514]: I1213 15:24:07.488047 1514 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.752521141 podStartE2EDuration="8.488011882s" podCreationTimestamp="2024-12-13 15:23:59 +0000 UTC" firstStartedPulling="2024-12-13 15:23:59.804058414 +0000 UTC m=+56.246481660" lastFinishedPulling="2024-12-13 15:24:06.539549101 +0000 UTC m=+62.981972401" observedRunningTime="2024-12-13 15:24:07.487706244 +0000 UTC m=+63.930129533" watchObservedRunningTime="2024-12-13 15:24:07.488011882 +0000 UTC m=+63.930435182" Dec 13 15:24:07.521000 audit[3045]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:24:07.521000 audit[3045]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe150d07a0 a2=0 a3=7ffe150d078c items=0 ppid=1764 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:07.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:24:07.526000 audit[3045]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:24:07.526000 audit[3045]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe150d07a0 a2=0 a3=7ffe150d078c items=0 ppid=1764 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:07.526000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:24:08.129958 kubelet[1514]: E1213 15:24:08.129888 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:09.131714 kubelet[1514]: E1213 15:24:09.131637 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:10.132490 kubelet[1514]: E1213 15:24:10.132405 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:11.134345 kubelet[1514]: E1213 15:24:11.134294 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:12.135965 kubelet[1514]: E1213 15:24:12.135871 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:13.136619 kubelet[1514]: E1213 15:24:13.136550 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:14.138582 kubelet[1514]: E1213 15:24:14.138501 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:15.140501 kubelet[1514]: E1213 15:24:15.140350 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:16.140993 kubelet[1514]: E1213 15:24:16.140948 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:16.795817 kubelet[1514]: I1213 15:24:16.795244 1514 topology_manager.go:215] "Topology Admit Handler" podUID="0e93b184-4065-4e75-bbbd-2fba957ecf8c" podNamespace="default" podName="test-pod-1" Dec 13 15:24:16.805743 systemd[1]: Created slice kubepods-besteffort-pod0e93b184_4065_4e75_bbbd_2fba957ecf8c.slice. Dec 13 15:24:16.910788 kubelet[1514]: I1213 15:24:16.910669 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-614b5a6d-0d1e-4a5a-957c-d4a00f9c0cc3\" (UniqueName: \"kubernetes.io/nfs/0e93b184-4065-4e75-bbbd-2fba957ecf8c-pvc-614b5a6d-0d1e-4a5a-957c-d4a00f9c0cc3\") pod \"test-pod-1\" (UID: \"0e93b184-4065-4e75-bbbd-2fba957ecf8c\") " pod="default/test-pod-1" Dec 13 15:24:16.911612 kubelet[1514]: I1213 15:24:16.911432 1514 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fs4tm\" (UniqueName: \"kubernetes.io/projected/0e93b184-4065-4e75-bbbd-2fba957ecf8c-kube-api-access-fs4tm\") pod \"test-pod-1\" (UID: \"0e93b184-4065-4e75-bbbd-2fba957ecf8c\") " pod="default/test-pod-1" Dec 13 15:24:17.052508 kernel: Failed to create system directory netfs Dec 13 15:24:17.052802 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 15:24:17.052838 kernel: audit: type=1400 audit(1734103457.045:758): avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.045000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.045000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.057241 kernel: Failed to create system directory netfs Dec 13 15:24:17.057284 kernel: audit: type=1400 audit(1734103457.045:758): avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.060958 kernel: Failed to create system directory netfs Dec 13 15:24:17.061020 kernel: audit: type=1400 audit(1734103457.045:758): avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.045000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.064807 kernel: Failed to create system directory netfs Dec 13 15:24:17.064859 kernel: audit: type=1400 audit(1734103457.045:758): avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.045000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.045000 audit[3061]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bdf2c25e0 a1=153bc a2=557bc35172b0 a3=5 items=0 ppid=492 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:17.045000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:24:17.078559 kernel: audit: type=1300 audit(1734103457.045:758): arch=c000003e syscall=175 success=yes exit=0 a0=557bdf2c25e0 a1=153bc a2=557bc35172b0 a3=5 items=0 ppid=492 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:17.078621 kernel: audit: type=1327 audit(1734103457.045:758): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.088689 kernel: Failed to create system directory fscache Dec 13 15:24:17.088739 kernel: audit: type=1400 audit(1734103457.080:759): avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.088772 kernel: Failed to create system directory fscache Dec 13 15:24:17.088802 kernel: audit: type=1400 audit(1734103457.080:759): avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.092521 kernel: Failed to create system directory fscache Dec 13 15:24:17.092570 kernel: audit: type=1400 audit(1734103457.080:759): avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.096395 kernel: Failed to create system directory fscache Dec 13 15:24:17.096445 kernel: audit: type=1400 audit(1734103457.080:759): avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.099552 kernel: Failed to create system directory fscache Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.101814 kernel: Failed to create system directory fscache Dec 13 15:24:17.101866 kernel: Failed to create system directory fscache Dec 13 15:24:17.101889 kernel: Failed to create system directory fscache Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.103381 kernel: Failed to create system directory fscache Dec 13 15:24:17.103425 kernel: Failed to create system directory fscache Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.104948 kernel: Failed to create system directory fscache Dec 13 15:24:17.105005 kernel: Failed to create system directory fscache Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.106466 kernel: Failed to create system directory fscache Dec 13 15:24:17.106498 kernel: Failed to create system directory fscache Dec 13 15:24:17.080000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.109222 kernel: FS-Cache: Loaded Dec 13 15:24:17.080000 audit[3061]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bdf4d79c0 a1=4c0fc a2=557bc35172b0 a3=5 items=0 ppid=492 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:17.080000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:24:17.141800 kubelet[1514]: E1213 15:24:17.141705 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.148438 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.148551 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.148607 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.149919 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.150006 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.150675 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.151410 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.152902 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.152992 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.154467 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.154556 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.155243 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.156707 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.156781 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.158940 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.159048 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.159112 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.159679 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.160419 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.161921 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.162009 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.171905 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.172012 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.173432 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.173500 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.174908 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.174980 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.175678 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.176418 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.177911 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.177979 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.178658 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.179401 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.180892 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.180946 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.181643 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.182418 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.183925 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.184050 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.184640 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.185386 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.186868 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.186933 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.187623 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.188382 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.189854 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.189905 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.190598 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.191348 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.192873 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.192951 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.194401 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.194445 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.195872 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.196669 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.196705 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.198958 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.199004 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.199029 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.199673 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.200395 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.201890 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.201930 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.203419 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.203470 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.204897 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.204936 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.206362 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.206431 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.207819 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.207869 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.208555 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.209265 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.210802 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.210846 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.211503 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.212309 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.213940 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.213986 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.214552 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.215266 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.216819 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.216871 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.217548 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.218290 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.219783 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.219834 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.220530 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.221267 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.222770 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.222823 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.223583 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.224294 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.225764 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.225818 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.226511 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.227293 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.228767 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.228857 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.229507 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.230277 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.231888 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.232080 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.232568 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.233342 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.234839 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.234960 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.235591 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.236356 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.237845 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.237967 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.238658 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.239307 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.240796 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.240848 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.241492 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.242301 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.243853 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.243999 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.244577 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.245304 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.246838 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.246959 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.247535 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.248308 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.134000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.249850 kernel: Failed to create system directory sunrpc Dec 13 15:24:17.263844 kernel: RPC: Registered named UNIX socket transport module. Dec 13 15:24:17.264061 kernel: RPC: Registered udp transport module. Dec 13 15:24:17.264115 kernel: RPC: Registered tcp transport module. Dec 13 15:24:17.264152 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 15:24:17.134000 audit[3061]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bdf523ad0 a1=1a7f1c a2=557bc35172b0 a3=5 items=6 ppid=492 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:17.134000 audit: CWD cwd="/" Dec 13 15:24:17.134000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:24:17.134000 audit: PATH item=1 name=(null) inode=25191 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:24:17.134000 audit: PATH item=2 name=(null) inode=25191 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:24:17.134000 audit: PATH item=3 name=(null) inode=25192 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:24:17.134000 audit: PATH item=4 name=(null) inode=25191 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:24:17.134000 audit: PATH item=5 name=(null) inode=25193 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:24:17.134000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.312453 kernel: Failed to create system directory nfs Dec 13 15:24:17.315274 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.317689 kernel: Failed to create system directory nfs Dec 13 15:24:17.317750 kernel: Failed to create system directory nfs Dec 13 15:24:17.317781 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.319443 kernel: Failed to create system directory nfs Dec 13 15:24:17.319494 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.321218 kernel: Failed to create system directory nfs Dec 13 15:24:17.321249 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.322884 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.323828 kernel: Failed to create system directory nfs Dec 13 15:24:17.323941 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.325546 kernel: Failed to create system directory nfs Dec 13 15:24:17.325655 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.327262 kernel: Failed to create system directory nfs Dec 13 15:24:17.327355 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.328759 kernel: Failed to create system directory nfs Dec 13 15:24:17.328816 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.330299 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.331808 kernel: Failed to create system directory nfs Dec 13 15:24:17.331852 kernel: Failed to create system directory nfs Dec 13 15:24:17.331969 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.333389 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.334873 kernel: Failed to create system directory nfs Dec 13 15:24:17.334901 kernel: Failed to create system directory nfs Dec 13 15:24:17.334934 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.336400 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.337973 kernel: Failed to create system directory nfs Dec 13 15:24:17.338057 kernel: Failed to create system directory nfs Dec 13 15:24:17.338086 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.339579 kernel: Failed to create system directory nfs Dec 13 15:24:17.339659 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.341850 kernel: Failed to create system directory nfs Dec 13 15:24:17.341900 kernel: Failed to create system directory nfs Dec 13 15:24:17.341936 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.343447 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.344249 kernel: Failed to create system directory nfs Dec 13 15:24:17.344321 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.345770 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.346560 kernel: Failed to create system directory nfs Dec 13 15:24:17.346652 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.348835 kernel: Failed to create system directory nfs Dec 13 15:24:17.348933 kernel: Failed to create system directory nfs Dec 13 15:24:17.349011 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.350384 kernel: Failed to create system directory nfs Dec 13 15:24:17.350493 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.351905 kernel: Failed to create system directory nfs Dec 13 15:24:17.352041 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.353471 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.354288 kernel: Failed to create system directory nfs Dec 13 15:24:17.354365 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.355778 kernel: Failed to create system directory nfs Dec 13 15:24:17.355860 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.357326 kernel: Failed to create system directory nfs Dec 13 15:24:17.357393 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.358826 kernel: Failed to create system directory nfs Dec 13 15:24:17.358912 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.360382 kernel: Failed to create system directory nfs Dec 13 15:24:17.360452 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.300000 audit[3061]: AVC avc: denied { confidentiality } for pid=3061 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.361891 kernel: Failed to create system directory nfs Dec 13 15:24:17.300000 audit[3061]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bdf744700 a1=16e97c a2=557bc35172b0 a3=5 items=0 ppid=492 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:17.386687 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 15:24:17.300000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.444435 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.444486 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.445318 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.446228 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.447785 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.447814 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.448618 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.450755 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.461980 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.462062 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.463226 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.464780 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.464821 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.465619 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.466571 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.467455 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.468317 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.469220 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.470789 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.470898 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.471850 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.472710 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.473532 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.474364 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.475844 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.475873 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.476628 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.477397 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.478878 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.478906 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.480911 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.482810 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.482847 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.483945 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.484771 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.485587 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.486413 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.487253 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.487186 systemd[1]: run-containerd-runc-k8s.io-a624810810c63c4bf0ad917e8c3c6398c5ae5951ba3342469964b80c89435966-runc.g95gYx.mount: Deactivated successfully. Dec 13 15:24:17.488822 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.489668 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.490492 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.491306 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.492899 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.492938 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.493735 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.494918 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.495995 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.496820 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.497602 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.498392 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.499236 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.500765 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.500800 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.501600 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.502414 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.503883 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.503910 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.504678 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.505666 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.506587 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.507486 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.508326 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.509921 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.509957 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.515908 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.518936 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.518997 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.519018 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.519833 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.520658 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.521467 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.522737 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.523869 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.524736 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.525700 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.526631 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.527608 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.528579 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.529530 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.530480 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.532334 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.534524 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.534583 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.535488 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.536378 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.537258 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.538914 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.538952 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.539846 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.540854 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.541842 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.542773 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.543685 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.544575 kernel: Failed to create system directory nfs4 Dec 13 15:24:17.428000 audit[3066]: AVC avc: denied { confidentiality } for pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.708621 kernel: NFS: Registering the id_resolver key type Dec 13 15:24:17.708769 kernel: Key type id_resolver registered Dec 13 15:24:17.708795 kernel: Key type id_legacy registered Dec 13 15:24:17.428000 audit[3066]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f41c897d010 a1=208de4 a2=55f4b9b602b0 a3=5 items=0 ppid=492 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:17.428000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.726430 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.728921 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.728967 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.729006 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.729880 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.730768 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.731664 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.732587 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.733418 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.734299 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.735263 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.736906 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.736944 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.737813 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.738692 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.739582 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.740461 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.741363 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.742266 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.742504 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.743953 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.744064 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.745483 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.745530 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.751046 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.751140 kernel: Failed to create system directory rpcgss Dec 13 15:24:17.720000 audit[3089]: AVC avc: denied { confidentiality } for pid=3089 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:24:17.720000 audit[3089]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f23bf481010 a1=70af4 a2=557f83ed82b0 a3=5 items=0 ppid=492 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:17.720000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 15:24:17.784576 nfsidmap[3097]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Dec 13 15:24:17.794047 nfsidmap[3100]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Dec 13 15:24:18.012636 env[1197]: time="2024-12-13T15:24:18.012298816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0e93b184-4065-4e75-bbbd-2fba957ecf8c,Namespace:default,Attempt:0,}" Dec 13 15:24:18.033000 audit[1264]: AVC avc: denied { watch_reads } for pid=1264 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2662 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:24:18.033000 audit[1264]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56211d7104f0 a2=10 a3=b82d626912529fcf items=0 ppid=1 pid=1264 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.033000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 15:24:18.034000 audit[1264]: AVC avc: denied { watch_reads } for pid=1264 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2662 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:24:18.034000 audit[1264]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56211d7104f0 a2=10 a3=b82d626912529fcf items=0 ppid=1 pid=1264 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.034000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 15:24:18.034000 audit[1264]: AVC avc: denied { watch_reads } for pid=1264 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2662 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:24:18.034000 audit[1264]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56211d7104f0 a2=10 a3=b82d626912529fcf items=0 ppid=1 pid=1264 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.034000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 15:24:18.037000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2662 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:24:18.037000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2662 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:24:18.037000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2662 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:24:18.143807 kubelet[1514]: E1213 15:24:18.143691 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:18.200341 systemd-networkd[1029]: cali5ec59c6bf6e: Link UP Dec 13 15:24:18.203236 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:24:18.203320 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 15:24:18.203450 systemd-networkd[1029]: cali5ec59c6bf6e: Gained carrier Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.087 [INFO][3103] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.97.150-k8s-test--pod--1-eth0 default 0e93b184-4065-4e75-bbbd-2fba957ecf8c 1411 0 2024-12-13 15:24:01 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.244.97.150 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.150-k8s-test--pod--1-" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.087 [INFO][3103] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.150-k8s-test--pod--1-eth0" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.127 [INFO][3115] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" HandleID="k8s-pod-network.360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" Workload="10.244.97.150-k8s-test--pod--1-eth0" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.141 [INFO][3115] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" HandleID="k8s-pod-network.360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" Workload="10.244.97.150-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318980), Attrs:map[string]string{"namespace":"default", "node":"10.244.97.150", "pod":"test-pod-1", "timestamp":"2024-12-13 15:24:18.126989589 +0000 UTC"}, Hostname:"10.244.97.150", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.141 [INFO][3115] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.141 [INFO][3115] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.141 [INFO][3115] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.97.150' Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.144 [INFO][3115] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" host="10.244.97.150" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.150 [INFO][3115] ipam/ipam.go 372: Looking up existing affinities for host host="10.244.97.150" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.158 [INFO][3115] ipam/ipam.go 489: Trying affinity for 192.168.31.192/26 host="10.244.97.150" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.161 [INFO][3115] ipam/ipam.go 155: Attempting to load block cidr=192.168.31.192/26 host="10.244.97.150" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.165 [INFO][3115] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.31.192/26 host="10.244.97.150" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.165 [INFO][3115] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.31.192/26 handle="k8s-pod-network.360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" host="10.244.97.150" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.168 [INFO][3115] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1 Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.175 [INFO][3115] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.31.192/26 handle="k8s-pod-network.360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" host="10.244.97.150" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.185 [INFO][3115] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.31.196/26] block=192.168.31.192/26 handle="k8s-pod-network.360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" host="10.244.97.150" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.185 [INFO][3115] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.31.196/26] handle="k8s-pod-network.360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" host="10.244.97.150" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.185 [INFO][3115] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.185 [INFO][3115] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.31.196/26] IPv6=[] ContainerID="360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" HandleID="k8s-pod-network.360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" Workload="10.244.97.150-k8s-test--pod--1-eth0" Dec 13 15:24:18.222387 env[1197]: 2024-12-13 15:24:18.188 [INFO][3103] cni-plugin/k8s.go 386: Populated endpoint ContainerID="360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.150-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0e93b184-4065-4e75-bbbd-2fba957ecf8c", ResourceVersion:"1411", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 24, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:24:18.223826 env[1197]: 2024-12-13 15:24:18.188 [INFO][3103] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.31.196/32] ContainerID="360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.150-k8s-test--pod--1-eth0" Dec 13 15:24:18.223826 env[1197]: 2024-12-13 15:24:18.188 [INFO][3103] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.150-k8s-test--pod--1-eth0" Dec 13 15:24:18.223826 env[1197]: 2024-12-13 15:24:18.204 [INFO][3103] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.150-k8s-test--pod--1-eth0" Dec 13 15:24:18.223826 env[1197]: 2024-12-13 15:24:18.205 [INFO][3103] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.150-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.97.150-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0e93b184-4065-4e75-bbbd-2fba957ecf8c", ResourceVersion:"1411", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 24, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.97.150", ContainerID:"360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"c6:bf:75:b7:77:f5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:24:18.223826 env[1197]: 2024-12-13 15:24:18.220 [INFO][3103] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.97.150-k8s-test--pod--1-eth0" Dec 13 15:24:18.239572 env[1197]: time="2024-12-13T15:24:18.239391880Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:24:18.239572 env[1197]: time="2024-12-13T15:24:18.239438053Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:24:18.239572 env[1197]: time="2024-12-13T15:24:18.239449477Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:24:18.239941 env[1197]: time="2024-12-13T15:24:18.239871625Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1 pid=3143 runtime=io.containerd.runc.v2 Dec 13 15:24:18.246000 audit[3153]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_chain pid=3153 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:24:18.246000 audit[3153]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7ffc466fd780 a2=0 a3=7ffc466fd76c items=0 ppid=2188 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.246000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:24:18.264698 systemd[1]: run-containerd-runc-k8s.io-360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1-runc.FP4Iuj.mount: Deactivated successfully. Dec 13 15:24:18.270067 systemd[1]: Started cri-containerd-360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1.scope. Dec 13 15:24:18.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.291000 audit: BPF prog-id=126 op=LOAD Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3143 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303739356530323635663433653937383961633034653131316337 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3143 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303739356530323635663433653937383961633034653131316337 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit: BPF prog-id=127 op=LOAD Dec 13 15:24:18.292000 audit[3152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000210f80 items=0 ppid=3143 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303739356530323635663433653937383961633034653131316337 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit: BPF prog-id=128 op=LOAD Dec 13 15:24:18.292000 audit[3152]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000210fc8 items=0 ppid=3143 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303739356530323635663433653937383961633034653131316337 Dec 13 15:24:18.292000 audit: BPF prog-id=128 op=UNLOAD Dec 13 15:24:18.292000 audit: BPF prog-id=127 op=UNLOAD Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.292000 audit: BPF prog-id=129 op=LOAD Dec 13 15:24:18.292000 audit[3152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002113d8 items=0 ppid=3143 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303739356530323635663433653937383961633034653131316337 Dec 13 15:24:18.343423 env[1197]: time="2024-12-13T15:24:18.343377087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0e93b184-4065-4e75-bbbd-2fba957ecf8c,Namespace:default,Attempt:0,} returns sandbox id \"360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1\"" Dec 13 15:24:18.346419 env[1197]: time="2024-12-13T15:24:18.346392474Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 15:24:18.754275 env[1197]: time="2024-12-13T15:24:18.754188098Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:24:18.756135 env[1197]: time="2024-12-13T15:24:18.756086761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:24:18.760481 env[1197]: time="2024-12-13T15:24:18.760419198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:24:18.764564 env[1197]: time="2024-12-13T15:24:18.764511914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:24:18.765741 env[1197]: time="2024-12-13T15:24:18.765703017Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 15:24:18.776469 env[1197]: time="2024-12-13T15:24:18.776427518Z" level=info msg="CreateContainer within sandbox \"360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 15:24:18.800133 env[1197]: time="2024-12-13T15:24:18.800084162Z" level=info msg="CreateContainer within sandbox \"360795e0265f43e9789ac04e111c7530346c0043fcb283c385743d8eea64eec1\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9b174f98e852ef8f25fcfad2c4f329be54029cb480820b633957c3184f090fd9\"" Dec 13 15:24:18.801661 env[1197]: time="2024-12-13T15:24:18.801492028Z" level=info msg="StartContainer for \"9b174f98e852ef8f25fcfad2c4f329be54029cb480820b633957c3184f090fd9\"" Dec 13 15:24:18.825462 systemd[1]: Started cri-containerd-9b174f98e852ef8f25fcfad2c4f329be54029cb480820b633957c3184f090fd9.scope. Dec 13 15:24:18.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.841000 audit: BPF prog-id=130 op=LOAD Dec 13 15:24:18.842000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.842000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3143 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962313734663938653835326566386632356663666164326334663332 Dec 13 15:24:18.843000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.843000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3143 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962313734663938653835326566386632356663666164326334663332 Dec 13 15:24:18.843000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.843000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.843000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.843000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.843000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.843000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.843000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.843000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.843000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.843000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.843000 audit: BPF prog-id=131 op=LOAD Dec 13 15:24:18.843000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000350e20 items=0 ppid=3143 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962313734663938653835326566386632356663666164326334663332 Dec 13 15:24:18.844000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.844000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.844000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.844000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.844000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.844000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.844000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.844000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.844000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.844000 audit: BPF prog-id=132 op=LOAD Dec 13 15:24:18.844000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000350e68 items=0 ppid=3143 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962313734663938653835326566386632356663666164326334663332 Dec 13 15:24:18.844000 audit: BPF prog-id=132 op=UNLOAD Dec 13 15:24:18.845000 audit: BPF prog-id=131 op=UNLOAD Dec 13 15:24:18.845000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.845000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.845000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.845000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.845000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.845000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.845000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.845000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.845000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.845000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:24:18.845000 audit: BPF prog-id=133 op=LOAD Dec 13 15:24:18.845000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000351278 items=0 ppid=3143 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:18.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962313734663938653835326566386632356663666164326334663332 Dec 13 15:24:18.862542 env[1197]: time="2024-12-13T15:24:18.862503138Z" level=info msg="StartContainer for \"9b174f98e852ef8f25fcfad2c4f329be54029cb480820b633957c3184f090fd9\" returns successfully" Dec 13 15:24:19.144825 kubelet[1514]: E1213 15:24:19.144394 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:19.286034 systemd-networkd[1029]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 15:24:19.526485 kubelet[1514]: I1213 15:24:19.526401 1514 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=18.102996297 podStartE2EDuration="18.526351858s" podCreationTimestamp="2024-12-13 15:24:01 +0000 UTC" firstStartedPulling="2024-12-13 15:24:18.345383875 +0000 UTC m=+74.787807123" lastFinishedPulling="2024-12-13 15:24:18.768739382 +0000 UTC m=+75.211162684" observedRunningTime="2024-12-13 15:24:19.526062956 +0000 UTC m=+75.968486213" watchObservedRunningTime="2024-12-13 15:24:19.526351858 +0000 UTC m=+75.968775145" Dec 13 15:24:20.144665 kubelet[1514]: E1213 15:24:20.144598 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:21.145434 kubelet[1514]: E1213 15:24:21.145340 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:22.146586 kubelet[1514]: E1213 15:24:22.146497 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:23.147682 kubelet[1514]: E1213 15:24:23.147614 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:24.061345 kubelet[1514]: E1213 15:24:24.061262 1514 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:24.149287 kubelet[1514]: E1213 15:24:24.149217 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:25.150521 kubelet[1514]: E1213 15:24:25.150445 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:26.151021 kubelet[1514]: E1213 15:24:26.150899 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:27.151886 kubelet[1514]: E1213 15:24:27.151812 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:28.153231 kubelet[1514]: E1213 15:24:28.153122 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:24:29.153912 kubelet[1514]: E1213 15:24:29.153736 1514 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"