Dec 16 13:19:21.924531 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 16 13:19:21.924557 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 16 13:19:21.924574 kernel: BIOS-provided physical RAM map: Dec 16 13:19:21.924583 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 16 13:19:21.924594 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 16 13:19:21.924603 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 16 13:19:21.924614 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffd7fff] usable Dec 16 13:19:21.924623 kernel: BIOS-e820: [mem 0x000000007ffd8000-0x000000007fffffff] reserved Dec 16 13:19:21.924637 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 16 13:19:21.924646 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 16 13:19:21.924656 kernel: NX (Execute Disable) protection: active Dec 16 13:19:21.924666 kernel: SMBIOS 2.8 present. Dec 16 13:19:21.924676 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Dec 16 13:19:21.924686 kernel: Hypervisor detected: KVM Dec 16 13:19:21.924698 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 16 13:19:21.924711 kernel: kvm-clock: cpu 0, msr 6b19a001, primary cpu clock Dec 16 13:19:21.924718 kernel: kvm-clock: using sched offset of 4584995953 cycles Dec 16 13:19:21.924726 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 16 13:19:21.924734 kernel: tsc: Detected 2494.138 MHz processor Dec 16 13:19:21.924741 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 16 13:19:21.924749 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 16 13:19:21.924757 kernel: last_pfn = 0x7ffd8 max_arch_pfn = 0x400000000 Dec 16 13:19:21.924764 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 16 13:19:21.924774 kernel: ACPI: Early table checksum verification disabled Dec 16 13:19:21.924781 kernel: ACPI: RSDP 0x00000000000F5A50 000014 (v00 BOCHS ) Dec 16 13:19:21.924788 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:19:21.924795 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:19:21.924802 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:19:21.924809 kernel: ACPI: FACS 0x000000007FFE0000 000040 Dec 16 13:19:21.924816 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:19:21.924824 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:19:21.924831 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:19:21.924840 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:19:21.924847 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Dec 16 13:19:21.924854 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Dec 16 13:19:21.924861 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Dec 16 13:19:21.924868 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Dec 16 13:19:21.924875 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Dec 16 13:19:21.924882 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Dec 16 13:19:21.924889 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Dec 16 13:19:21.924903 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 16 13:19:21.924910 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 16 13:19:21.924918 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 16 13:19:21.924926 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 16 13:19:21.924934 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffd7fff] -> [mem 0x00000000-0x7ffd7fff] Dec 16 13:19:21.924942 kernel: NODE_DATA(0) allocated [mem 0x7ffd2000-0x7ffd7fff] Dec 16 13:19:21.924952 kernel: Zone ranges: Dec 16 13:19:21.924959 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 16 13:19:21.924967 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffd7fff] Dec 16 13:19:21.924975 kernel: Normal empty Dec 16 13:19:21.924983 kernel: Movable zone start for each node Dec 16 13:19:21.924990 kernel: Early memory node ranges Dec 16 13:19:21.924998 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 16 13:19:21.925005 kernel: node 0: [mem 0x0000000000100000-0x000000007ffd7fff] Dec 16 13:19:21.925013 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffd7fff] Dec 16 13:19:21.925023 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 16 13:19:21.925031 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 16 13:19:21.925039 kernel: On node 0, zone DMA32: 40 pages in unavailable ranges Dec 16 13:19:21.925047 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 16 13:19:21.925055 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 16 13:19:21.925062 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 16 13:19:21.925070 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 16 13:19:21.925078 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 16 13:19:21.925085 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 16 13:19:21.925095 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 16 13:19:21.925103 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 16 13:19:21.925111 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 16 13:19:21.925118 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 16 13:19:21.925127 kernel: TSC deadline timer available Dec 16 13:19:21.925134 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 16 13:19:21.925142 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Dec 16 13:19:21.925150 kernel: Booting paravirtualized kernel on KVM Dec 16 13:19:21.925158 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 16 13:19:21.925168 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 16 13:19:21.925176 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 16 13:19:21.925183 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 16 13:19:21.925191 kernel: pcpu-alloc: [0] 0 1 Dec 16 13:19:21.925198 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Dec 16 13:19:21.925206 kernel: kvm-guest: PV spinlocks disabled, no host support Dec 16 13:19:21.925213 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515800 Dec 16 13:19:21.925221 kernel: Policy zone: DMA32 Dec 16 13:19:21.925230 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 16 13:19:21.925254 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 16 13:19:21.925262 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 16 13:19:21.925270 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 16 13:19:21.925278 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 16 13:19:21.925286 kernel: Memory: 1973264K/2096600K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 123076K reserved, 0K cma-reserved) Dec 16 13:19:21.925294 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 16 13:19:21.925302 kernel: Kernel/User page tables isolation: enabled Dec 16 13:19:21.925310 kernel: ftrace: allocating 34549 entries in 135 pages Dec 16 13:19:21.936288 kernel: ftrace: allocated 135 pages with 4 groups Dec 16 13:19:21.936321 kernel: rcu: Hierarchical RCU implementation. Dec 16 13:19:21.936332 kernel: rcu: RCU event tracing is enabled. Dec 16 13:19:21.936341 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 16 13:19:21.936350 kernel: Rude variant of Tasks RCU enabled. Dec 16 13:19:21.936358 kernel: Tracing variant of Tasks RCU enabled. Dec 16 13:19:21.936366 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 16 13:19:21.936375 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 16 13:19:21.936383 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 16 13:19:21.936399 kernel: random: crng init done Dec 16 13:19:21.936407 kernel: Console: colour VGA+ 80x25 Dec 16 13:19:21.936415 kernel: printk: console [tty0] enabled Dec 16 13:19:21.936423 kernel: printk: console [ttyS0] enabled Dec 16 13:19:21.936431 kernel: ACPI: Core revision 20210730 Dec 16 13:19:21.936439 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 16 13:19:21.936448 kernel: APIC: Switch to symmetric I/O mode setup Dec 16 13:19:21.936456 kernel: x2apic enabled Dec 16 13:19:21.936464 kernel: Switched APIC routing to physical x2apic. Dec 16 13:19:21.936474 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 16 13:19:21.936483 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39838d43, max_idle_ns: 440795267131 ns Dec 16 13:19:21.936491 kernel: Calibrating delay loop (skipped) preset value.. 4988.27 BogoMIPS (lpj=2494138) Dec 16 13:19:21.936499 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 16 13:19:21.936507 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 16 13:19:21.936515 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 16 13:19:21.936523 kernel: Spectre V2 : Mitigation: Retpolines Dec 16 13:19:21.936531 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 16 13:19:21.936539 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 16 13:19:21.936550 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Dec 16 13:19:21.936567 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 16 13:19:21.936575 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 16 13:19:21.936586 kernel: MDS: Mitigation: Clear CPU buffers Dec 16 13:19:21.936595 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 16 13:19:21.936603 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 16 13:19:21.936611 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 16 13:19:21.936620 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 16 13:19:21.936628 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 16 13:19:21.936637 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 16 13:19:21.936648 kernel: Freeing SMP alternatives memory: 32K Dec 16 13:19:21.936656 kernel: pid_max: default: 32768 minimum: 301 Dec 16 13:19:21.936664 kernel: LSM: Security Framework initializing Dec 16 13:19:21.936673 kernel: SELinux: Initializing. Dec 16 13:19:21.936681 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 16 13:19:21.936690 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 16 13:19:21.936701 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) Dec 16 13:19:21.936709 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. Dec 16 13:19:21.936718 kernel: signal: max sigframe size: 1776 Dec 16 13:19:21.936726 kernel: rcu: Hierarchical SRCU implementation. Dec 16 13:19:21.936734 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 16 13:19:21.936742 kernel: smp: Bringing up secondary CPUs ... Dec 16 13:19:21.936750 kernel: x86: Booting SMP configuration: Dec 16 13:19:21.936759 kernel: .... node #0, CPUs: #1 Dec 16 13:19:21.936767 kernel: kvm-clock: cpu 1, msr 6b19a041, secondary cpu clock Dec 16 13:19:21.936775 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Dec 16 13:19:21.936786 kernel: smp: Brought up 1 node, 2 CPUs Dec 16 13:19:21.936794 kernel: smpboot: Max logical packages: 1 Dec 16 13:19:21.936802 kernel: smpboot: Total of 2 processors activated (9976.55 BogoMIPS) Dec 16 13:19:21.936811 kernel: devtmpfs: initialized Dec 16 13:19:21.936819 kernel: x86/mm: Memory block size: 128MB Dec 16 13:19:21.936827 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 16 13:19:21.936836 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 16 13:19:21.936844 kernel: pinctrl core: initialized pinctrl subsystem Dec 16 13:19:21.936852 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 16 13:19:21.936863 kernel: audit: initializing netlink subsys (disabled) Dec 16 13:19:21.936871 kernel: audit: type=2000 audit(1734355161.368:1): state=initialized audit_enabled=0 res=1 Dec 16 13:19:21.936879 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 16 13:19:21.936888 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 16 13:19:21.936896 kernel: cpuidle: using governor menu Dec 16 13:19:21.936904 kernel: ACPI: bus type PCI registered Dec 16 13:19:21.936912 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 16 13:19:21.936921 kernel: dca service started, version 1.12.1 Dec 16 13:19:21.936929 kernel: PCI: Using configuration type 1 for base access Dec 16 13:19:21.936940 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 16 13:19:21.936949 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 16 13:19:21.936957 kernel: ACPI: Added _OSI(Module Device) Dec 16 13:19:21.936965 kernel: ACPI: Added _OSI(Processor Device) Dec 16 13:19:21.936973 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 16 13:19:21.936994 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 16 13:19:21.937005 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 16 13:19:21.937014 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 16 13:19:21.937022 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 16 13:19:21.937033 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 16 13:19:21.937041 kernel: ACPI: Interpreter enabled Dec 16 13:19:21.937050 kernel: ACPI: PM: (supports S0 S5) Dec 16 13:19:21.937058 kernel: ACPI: Using IOAPIC for interrupt routing Dec 16 13:19:21.937066 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 16 13:19:21.937075 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 16 13:19:21.937083 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 16 13:19:21.937341 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 16 13:19:21.937441 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 16 13:19:21.937453 kernel: acpiphp: Slot [3] registered Dec 16 13:19:21.937462 kernel: acpiphp: Slot [4] registered Dec 16 13:19:21.937471 kernel: acpiphp: Slot [5] registered Dec 16 13:19:21.937479 kernel: acpiphp: Slot [6] registered Dec 16 13:19:21.937487 kernel: acpiphp: Slot [7] registered Dec 16 13:19:21.937495 kernel: acpiphp: Slot [8] registered Dec 16 13:19:21.937504 kernel: acpiphp: Slot [9] registered Dec 16 13:19:21.937516 kernel: acpiphp: Slot [10] registered Dec 16 13:19:21.937524 kernel: acpiphp: Slot [11] registered Dec 16 13:19:21.937533 kernel: acpiphp: Slot [12] registered Dec 16 13:19:21.937541 kernel: acpiphp: Slot [13] registered Dec 16 13:19:21.937549 kernel: acpiphp: Slot [14] registered Dec 16 13:19:21.937558 kernel: acpiphp: Slot [15] registered Dec 16 13:19:21.937566 kernel: acpiphp: Slot [16] registered Dec 16 13:19:21.937574 kernel: acpiphp: Slot [17] registered Dec 16 13:19:21.937582 kernel: acpiphp: Slot [18] registered Dec 16 13:19:21.937591 kernel: acpiphp: Slot [19] registered Dec 16 13:19:21.937601 kernel: acpiphp: Slot [20] registered Dec 16 13:19:21.937609 kernel: acpiphp: Slot [21] registered Dec 16 13:19:21.937618 kernel: acpiphp: Slot [22] registered Dec 16 13:19:21.937626 kernel: acpiphp: Slot [23] registered Dec 16 13:19:21.937634 kernel: acpiphp: Slot [24] registered Dec 16 13:19:21.937642 kernel: acpiphp: Slot [25] registered Dec 16 13:19:21.937650 kernel: acpiphp: Slot [26] registered Dec 16 13:19:21.937684 kernel: acpiphp: Slot [27] registered Dec 16 13:19:21.937696 kernel: acpiphp: Slot [28] registered Dec 16 13:19:21.937713 kernel: acpiphp: Slot [29] registered Dec 16 13:19:21.937725 kernel: acpiphp: Slot [30] registered Dec 16 13:19:21.937737 kernel: acpiphp: Slot [31] registered Dec 16 13:19:21.937748 kernel: PCI host bridge to bus 0000:00 Dec 16 13:19:21.937855 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 16 13:19:21.937937 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 16 13:19:21.938015 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 16 13:19:21.938096 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 16 13:19:21.938177 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Dec 16 13:19:21.938301 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 16 13:19:21.938453 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 16 13:19:21.938566 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 16 13:19:21.938664 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 16 13:19:21.938753 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Dec 16 13:19:21.938848 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 16 13:19:21.938942 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 16 13:19:21.939030 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 16 13:19:21.939117 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 16 13:19:21.939214 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Dec 16 13:19:21.939329 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Dec 16 13:19:21.939492 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 16 13:19:21.939623 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 16 13:19:21.939715 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 16 13:19:21.939822 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 16 13:19:21.939920 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 16 13:19:21.940055 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 16 13:19:21.940149 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Dec 16 13:19:21.940264 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Dec 16 13:19:21.940357 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 16 13:19:21.940458 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 16 13:19:21.940550 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Dec 16 13:19:21.940641 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Dec 16 13:19:21.940733 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 16 13:19:21.940835 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 16 13:19:21.940932 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Dec 16 13:19:21.941023 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Dec 16 13:19:21.941125 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 16 13:19:21.941261 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Dec 16 13:19:21.941405 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Dec 16 13:19:21.941508 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Dec 16 13:19:21.941599 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 16 13:19:21.941953 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Dec 16 13:19:21.943492 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Dec 16 13:19:21.943617 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Dec 16 13:19:21.943713 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 16 13:19:21.943815 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Dec 16 13:19:21.943909 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Dec 16 13:19:21.944002 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Dec 16 13:19:21.944103 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Dec 16 13:19:21.944216 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Dec 16 13:19:21.944330 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Dec 16 13:19:21.944466 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Dec 16 13:19:21.944486 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 16 13:19:21.944500 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 16 13:19:21.944513 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 16 13:19:21.944533 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 16 13:19:21.944546 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 16 13:19:21.944560 kernel: iommu: Default domain type: Translated Dec 16 13:19:21.944572 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 16 13:19:21.944733 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 16 13:19:21.944855 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 16 13:19:21.944996 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 16 13:19:21.945015 kernel: vgaarb: loaded Dec 16 13:19:21.945037 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 16 13:19:21.945050 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 16 13:19:21.945063 kernel: PTP clock support registered Dec 16 13:19:21.945071 kernel: PCI: Using ACPI for IRQ routing Dec 16 13:19:21.945080 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 16 13:19:21.945089 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 16 13:19:21.945098 kernel: e820: reserve RAM buffer [mem 0x7ffd8000-0x7fffffff] Dec 16 13:19:21.945106 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 16 13:19:21.945115 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 16 13:19:21.945126 kernel: clocksource: Switched to clocksource kvm-clock Dec 16 13:19:21.945134 kernel: VFS: Disk quotas dquot_6.6.0 Dec 16 13:19:21.945143 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 16 13:19:21.945152 kernel: pnp: PnP ACPI init Dec 16 13:19:21.945160 kernel: pnp: PnP ACPI: found 4 devices Dec 16 13:19:21.945169 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 16 13:19:21.945177 kernel: NET: Registered PF_INET protocol family Dec 16 13:19:21.945185 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 16 13:19:21.945194 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 16 13:19:21.945205 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 16 13:19:21.945214 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 16 13:19:21.945222 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 16 13:19:21.945231 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 16 13:19:21.945253 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 16 13:19:21.945262 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 16 13:19:21.945270 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 16 13:19:21.945279 kernel: NET: Registered PF_XDP protocol family Dec 16 13:19:21.945415 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 16 13:19:21.945511 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 16 13:19:21.945596 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 16 13:19:21.945708 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 16 13:19:21.945795 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Dec 16 13:19:21.945894 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 16 13:19:21.946012 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 16 13:19:21.946105 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 16 13:19:21.946121 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 16 13:19:21.946214 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x730 took 37155 usecs Dec 16 13:19:21.946226 kernel: PCI: CLS 0 bytes, default 64 Dec 16 13:19:21.946234 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 16 13:19:21.946243 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39838d43, max_idle_ns: 440795267131 ns Dec 16 13:19:21.946271 kernel: Initialise system trusted keyrings Dec 16 13:19:21.946280 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 16 13:19:21.946289 kernel: Key type asymmetric registered Dec 16 13:19:21.946298 kernel: Asymmetric key parser 'x509' registered Dec 16 13:19:21.946310 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 16 13:19:21.946318 kernel: io scheduler mq-deadline registered Dec 16 13:19:21.946327 kernel: io scheduler kyber registered Dec 16 13:19:21.946343 kernel: io scheduler bfq registered Dec 16 13:19:21.946353 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 16 13:19:21.946362 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 16 13:19:21.946371 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 16 13:19:21.946379 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 16 13:19:21.946388 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 16 13:19:21.946396 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 16 13:19:21.946407 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 16 13:19:21.946420 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 16 13:19:21.946432 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 16 13:19:21.946444 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 16 13:19:21.946613 kernel: rtc_cmos 00:03: RTC can wake from S4 Dec 16 13:19:21.946703 kernel: rtc_cmos 00:03: registered as rtc0 Dec 16 13:19:21.946788 kernel: rtc_cmos 00:03: setting system clock to 2024-12-16T13:19:21 UTC (1734355161) Dec 16 13:19:21.946879 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Dec 16 13:19:21.946890 kernel: intel_pstate: CPU model not supported Dec 16 13:19:21.946898 kernel: NET: Registered PF_INET6 protocol family Dec 16 13:19:21.946907 kernel: Segment Routing with IPv6 Dec 16 13:19:21.946915 kernel: In-situ OAM (IOAM) with IPv6 Dec 16 13:19:21.946924 kernel: NET: Registered PF_PACKET protocol family Dec 16 13:19:21.946932 kernel: Key type dns_resolver registered Dec 16 13:19:21.946941 kernel: IPI shorthand broadcast: enabled Dec 16 13:19:21.946950 kernel: sched_clock: Marking stable (724030913, 94762089)->(941852301, -123059299) Dec 16 13:19:21.946962 kernel: registered taskstats version 1 Dec 16 13:19:21.946971 kernel: Loading compiled-in X.509 certificates Dec 16 13:19:21.946980 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 16 13:19:21.946988 kernel: Key type .fscrypt registered Dec 16 13:19:21.946996 kernel: Key type fscrypt-provisioning registered Dec 16 13:19:21.947005 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 16 13:19:21.947013 kernel: ima: Allocated hash algorithm: sha1 Dec 16 13:19:21.947022 kernel: ima: No architecture policies found Dec 16 13:19:21.947031 kernel: clk: Disabling unused clocks Dec 16 13:19:21.947042 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 16 13:19:21.947050 kernel: Write protecting the kernel read-only data: 28672k Dec 16 13:19:21.947059 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 16 13:19:21.947067 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 16 13:19:21.947076 kernel: Run /init as init process Dec 16 13:19:21.947085 kernel: with arguments: Dec 16 13:19:21.947112 kernel: /init Dec 16 13:19:21.947123 kernel: with environment: Dec 16 13:19:21.947131 kernel: HOME=/ Dec 16 13:19:21.947145 kernel: TERM=linux Dec 16 13:19:21.947154 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 16 13:19:21.947167 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 16 13:19:21.947180 systemd[1]: Detected virtualization kvm. Dec 16 13:19:21.947189 systemd[1]: Detected architecture x86-64. Dec 16 13:19:21.947198 systemd[1]: Running in initrd. Dec 16 13:19:21.947207 systemd[1]: No hostname configured, using default hostname. Dec 16 13:19:21.947216 systemd[1]: Hostname set to . Dec 16 13:19:21.947229 systemd[1]: Initializing machine ID from VM UUID. Dec 16 13:19:21.955294 systemd[1]: Queued start job for default target initrd.target. Dec 16 13:19:21.955337 systemd[1]: Started systemd-ask-password-console.path. Dec 16 13:19:21.955348 systemd[1]: Reached target cryptsetup.target. Dec 16 13:19:21.955358 systemd[1]: Reached target paths.target. Dec 16 13:19:21.955367 systemd[1]: Reached target slices.target. Dec 16 13:19:21.955376 systemd[1]: Reached target swap.target. Dec 16 13:19:21.955385 systemd[1]: Reached target timers.target. Dec 16 13:19:21.955408 systemd[1]: Listening on iscsid.socket. Dec 16 13:19:21.955423 systemd[1]: Listening on iscsiuio.socket. Dec 16 13:19:21.955437 systemd[1]: Listening on systemd-journald-audit.socket. Dec 16 13:19:21.955452 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 16 13:19:21.955462 systemd[1]: Listening on systemd-journald.socket. Dec 16 13:19:21.955473 systemd[1]: Listening on systemd-networkd.socket. Dec 16 13:19:21.955485 systemd[1]: Listening on systemd-udevd-control.socket. Dec 16 13:19:21.955501 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 16 13:19:21.955516 systemd[1]: Reached target sockets.target. Dec 16 13:19:21.955534 systemd[1]: Starting kmod-static-nodes.service... Dec 16 13:19:21.955558 systemd[1]: Finished network-cleanup.service. Dec 16 13:19:21.955576 systemd[1]: Starting systemd-fsck-usr.service... Dec 16 13:19:21.955596 systemd[1]: Starting systemd-journald.service... Dec 16 13:19:21.955619 systemd[1]: Starting systemd-modules-load.service... Dec 16 13:19:21.955639 systemd[1]: Starting systemd-resolved.service... Dec 16 13:19:21.955658 systemd[1]: Starting systemd-vconsole-setup.service... Dec 16 13:19:21.955679 systemd[1]: Finished kmod-static-nodes.service. Dec 16 13:19:21.955697 systemd[1]: Finished systemd-fsck-usr.service. Dec 16 13:19:21.955724 systemd-journald[185]: Journal started Dec 16 13:19:21.955880 systemd-journald[185]: Runtime Journal (/run/log/journal/76edb9a4b0864015a61880e2fbc85686) is 4.9M, max 39.5M, 34.5M free. Dec 16 13:19:21.939290 systemd-modules-load[186]: Inserted module 'overlay' Dec 16 13:19:21.987009 systemd[1]: Started systemd-journald.service. Dec 16 13:19:21.987041 kernel: audit: type=1130 audit(1734355161.978:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:21.987075 kernel: audit: type=1130 audit(1734355161.983:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:21.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:21.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:21.957832 systemd-resolved[187]: Positive Trust Anchors: Dec 16 13:19:21.994379 kernel: audit: type=1130 audit(1734355161.987:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:21.994420 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 16 13:19:21.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:21.957842 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 16 13:19:21.957876 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 16 13:19:21.960899 systemd-resolved[187]: Defaulting to hostname 'linux'. Dec 16 13:19:21.999093 kernel: Bridge firewalling registered Dec 16 13:19:21.999123 kernel: audit: type=1130 audit(1734355161.998:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:21.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:21.986762 systemd[1]: Started systemd-resolved.service. Dec 16 13:19:21.988111 systemd[1]: Finished systemd-vconsole-setup.service. Dec 16 13:19:21.997323 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 16 13:19:21.999052 systemd[1]: Reached target nss-lookup.target. Dec 16 13:19:22.003050 systemd[1]: Starting dracut-cmdline-ask.service... Dec 16 13:19:22.005066 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 16 13:19:22.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.018145 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 16 13:19:22.024043 kernel: audit: type=1130 audit(1734355162.018:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.026626 systemd[1]: Finished dracut-cmdline-ask.service. Dec 16 13:19:22.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.037355 kernel: audit: type=1130 audit(1734355162.026:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.037437 kernel: SCSI subsystem initialized Dec 16 13:19:22.032904 systemd[1]: Starting dracut-cmdline.service... Dec 16 13:19:22.048281 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 16 13:19:22.048369 kernel: device-mapper: uevent: version 1.0.3 Dec 16 13:19:22.048390 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 16 13:19:22.050587 dracut-cmdline[202]: dracut-dracut-053 Dec 16 13:19:22.052935 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 16 13:19:22.053899 systemd[1]: Finished systemd-modules-load.service. Dec 16 13:19:22.056138 systemd[1]: Starting systemd-sysctl.service... Dec 16 13:19:22.068024 kernel: audit: type=1130 audit(1734355162.054:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.068126 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 16 13:19:22.075768 systemd[1]: Finished systemd-sysctl.service. Dec 16 13:19:22.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.079269 kernel: audit: type=1130 audit(1734355162.076:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.161309 kernel: Loading iSCSI transport class v2.0-870. Dec 16 13:19:22.181281 kernel: iscsi: registered transport (tcp) Dec 16 13:19:22.208306 kernel: iscsi: registered transport (qla4xxx) Dec 16 13:19:22.208401 kernel: QLogic iSCSI HBA Driver Dec 16 13:19:22.263679 systemd[1]: Finished dracut-cmdline.service. Dec 16 13:19:22.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.265628 systemd[1]: Starting dracut-pre-udev.service... Dec 16 13:19:22.272657 kernel: audit: type=1130 audit(1734355162.264:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.326339 kernel: raid6: avx2x4 gen() 15197 MB/s Dec 16 13:19:22.343328 kernel: raid6: avx2x4 xor() 6550 MB/s Dec 16 13:19:22.360317 kernel: raid6: avx2x2 gen() 16037 MB/s Dec 16 13:19:22.377307 kernel: raid6: avx2x2 xor() 18676 MB/s Dec 16 13:19:22.394319 kernel: raid6: avx2x1 gen() 12385 MB/s Dec 16 13:19:22.411316 kernel: raid6: avx2x1 xor() 17227 MB/s Dec 16 13:19:22.428313 kernel: raid6: sse2x4 gen() 11696 MB/s Dec 16 13:19:22.445317 kernel: raid6: sse2x4 xor() 6928 MB/s Dec 16 13:19:22.462326 kernel: raid6: sse2x2 gen() 12604 MB/s Dec 16 13:19:22.479318 kernel: raid6: sse2x2 xor() 7426 MB/s Dec 16 13:19:22.496348 kernel: raid6: sse2x1 gen() 10255 MB/s Dec 16 13:19:22.513872 kernel: raid6: sse2x1 xor() 5491 MB/s Dec 16 13:19:22.513973 kernel: raid6: using algorithm avx2x2 gen() 16037 MB/s Dec 16 13:19:22.513988 kernel: raid6: .... xor() 18676 MB/s, rmw enabled Dec 16 13:19:22.514782 kernel: raid6: using avx2x2 recovery algorithm Dec 16 13:19:22.530310 kernel: xor: automatically using best checksumming function avx Dec 16 13:19:22.647288 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 16 13:19:22.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.661000 audit: BPF prog-id=7 op=LOAD Dec 16 13:19:22.661000 audit: BPF prog-id=8 op=LOAD Dec 16 13:19:22.660680 systemd[1]: Finished dracut-pre-udev.service. Dec 16 13:19:22.663086 systemd[1]: Starting systemd-udevd.service... Dec 16 13:19:22.679089 systemd-udevd[385]: Using default interface naming scheme 'v252'. Dec 16 13:19:22.684810 systemd[1]: Started systemd-udevd.service. Dec 16 13:19:22.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.689777 systemd[1]: Starting dracut-pre-trigger.service... Dec 16 13:19:22.707965 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Dec 16 13:19:22.751677 systemd[1]: Finished dracut-pre-trigger.service. Dec 16 13:19:22.753059 systemd[1]: Starting systemd-udev-trigger.service... Dec 16 13:19:22.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.804438 systemd[1]: Finished systemd-udev-trigger.service. Dec 16 13:19:22.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:22.862412 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Dec 16 13:19:22.910463 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 16 13:19:22.910490 kernel: GPT:9289727 != 125829119 Dec 16 13:19:22.910516 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 16 13:19:22.910537 kernel: GPT:9289727 != 125829119 Dec 16 13:19:22.910550 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 16 13:19:22.910565 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 16 13:19:22.910576 kernel: scsi host0: Virtio SCSI HBA Dec 16 13:19:22.910762 kernel: cryptd: max_cpu_qlen set to 1000 Dec 16 13:19:22.910775 kernel: AVX2 version of gcm_enc/dec engaged. Dec 16 13:19:22.914590 kernel: AES CTR mode by8 optimization enabled Dec 16 13:19:22.914674 kernel: virtio_blk virtio5: [vdb] 920 512-byte logical blocks (471 kB/460 KiB) Dec 16 13:19:22.968986 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 16 13:19:23.053162 kernel: ACPI: bus type USB registered Dec 16 13:19:23.053202 kernel: libata version 3.00 loaded. Dec 16 13:19:23.053231 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (434) Dec 16 13:19:23.053261 kernel: usbcore: registered new interface driver usbfs Dec 16 13:19:23.053273 kernel: usbcore: registered new interface driver hub Dec 16 13:19:23.053284 kernel: usbcore: registered new device driver usb Dec 16 13:19:23.053297 kernel: ata_piix 0000:00:01.1: version 2.13 Dec 16 13:19:23.053499 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Dec 16 13:19:23.053517 kernel: scsi host1: ata_piix Dec 16 13:19:23.053826 kernel: ehci-pci: EHCI PCI platform driver Dec 16 13:19:23.053851 kernel: scsi host2: ata_piix Dec 16 13:19:23.054001 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Dec 16 13:19:23.054018 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Dec 16 13:19:23.054033 kernel: uhci_hcd: USB Universal Host Controller Interface driver Dec 16 13:19:23.054048 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Dec 16 13:19:23.054185 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Dec 16 13:19:23.054333 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Dec 16 13:19:23.054446 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Dec 16 13:19:23.054544 kernel: hub 1-0:1.0: USB hub found Dec 16 13:19:23.054676 kernel: hub 1-0:1.0: 2 ports detected Dec 16 13:19:23.055919 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 16 13:19:23.062199 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 16 13:19:23.062686 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 16 13:19:23.068430 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 16 13:19:23.070049 systemd[1]: Starting disk-uuid.service... Dec 16 13:19:23.079000 disk-uuid[506]: Primary Header is updated. Dec 16 13:19:23.079000 disk-uuid[506]: Secondary Entries is updated. Dec 16 13:19:23.079000 disk-uuid[506]: Secondary Header is updated. Dec 16 13:19:23.087305 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 16 13:19:23.095305 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 16 13:19:23.101564 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 16 13:19:24.100451 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 16 13:19:24.101026 disk-uuid[507]: The operation has completed successfully. Dec 16 13:19:24.159911 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 16 13:19:24.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.160013 systemd[1]: Finished disk-uuid.service. Dec 16 13:19:24.161392 systemd[1]: Starting verity-setup.service... Dec 16 13:19:24.179273 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 16 13:19:24.235853 systemd[1]: Found device dev-mapper-usr.device. Dec 16 13:19:24.237917 systemd[1]: Mounting sysusr-usr.mount... Dec 16 13:19:24.239040 systemd[1]: Finished verity-setup.service. Dec 16 13:19:24.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.327265 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 16 13:19:24.327839 systemd[1]: Mounted sysusr-usr.mount. Dec 16 13:19:24.328891 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 16 13:19:24.330470 systemd[1]: Starting ignition-setup.service... Dec 16 13:19:24.332233 systemd[1]: Starting parse-ip-for-networkd.service... Dec 16 13:19:24.348319 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 16 13:19:24.348396 kernel: BTRFS info (device vda6): using free space tree Dec 16 13:19:24.348410 kernel: BTRFS info (device vda6): has skinny extents Dec 16 13:19:24.363013 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 16 13:19:24.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.374113 systemd[1]: Finished ignition-setup.service. Dec 16 13:19:24.375937 systemd[1]: Starting ignition-fetch-offline.service... Dec 16 13:19:24.485606 systemd[1]: Finished parse-ip-for-networkd.service. Dec 16 13:19:24.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.486000 audit: BPF prog-id=9 op=LOAD Dec 16 13:19:24.487941 systemd[1]: Starting systemd-networkd.service... Dec 16 13:19:24.517031 systemd-networkd[690]: lo: Link UP Dec 16 13:19:24.517041 systemd-networkd[690]: lo: Gained carrier Dec 16 13:19:24.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.517703 systemd-networkd[690]: Enumeration completed Dec 16 13:19:24.517844 systemd[1]: Started systemd-networkd.service. Dec 16 13:19:24.518486 systemd-networkd[690]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 16 13:19:24.518986 systemd[1]: Reached target network.target. Dec 16 13:19:24.520633 systemd[1]: Starting iscsiuio.service... Dec 16 13:19:24.521820 systemd-networkd[690]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Dec 16 13:19:24.523482 systemd-networkd[690]: eth1: Link UP Dec 16 13:19:24.523488 systemd-networkd[690]: eth1: Gained carrier Dec 16 13:19:24.530853 systemd-networkd[690]: eth0: Link UP Dec 16 13:19:24.530857 systemd-networkd[690]: eth0: Gained carrier Dec 16 13:19:24.545941 systemd[1]: Started iscsiuio.service. Dec 16 13:19:24.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.547389 systemd[1]: Starting iscsid.service... Dec 16 13:19:24.550473 ignition[612]: Ignition 2.14.0 Dec 16 13:19:24.550483 ignition[612]: Stage: fetch-offline Dec 16 13:19:24.550568 ignition[612]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:19:24.554775 iscsid[695]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 16 13:19:24.554775 iscsid[695]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 16 13:19:24.554775 iscsid[695]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 16 13:19:24.554775 iscsid[695]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 16 13:19:24.554775 iscsid[695]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 16 13:19:24.554775 iscsid[695]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 16 13:19:24.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.552215 systemd-networkd[690]: eth0: DHCPv4 address 146.190.170.252/20, gateway 146.190.160.1 acquired from 169.254.169.253 Dec 16 13:19:24.550595 ignition[612]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:19:24.555805 systemd[1]: Started iscsid.service. Dec 16 13:19:24.558480 ignition[612]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:19:24.563860 systemd-networkd[690]: eth1: DHCPv4 address 10.124.0.4/20, gateway 10.124.0.1 acquired from 169.254.169.253 Dec 16 13:19:24.558613 ignition[612]: parsed url from cmdline: "" Dec 16 13:19:24.567661 systemd[1]: Finished ignition-fetch-offline.service. Dec 16 13:19:24.558617 ignition[612]: no config URL provided Dec 16 13:19:24.569565 systemd[1]: Starting dracut-initqueue.service... Dec 16 13:19:24.558623 ignition[612]: reading system config file "/usr/lib/ignition/user.ign" Dec 16 13:19:24.572428 systemd[1]: Starting ignition-fetch.service... Dec 16 13:19:24.558631 ignition[612]: no config at "/usr/lib/ignition/user.ign" Dec 16 13:19:24.558638 ignition[612]: failed to fetch config: resource requires networking Dec 16 13:19:24.558882 ignition[612]: Ignition finished successfully Dec 16 13:19:24.594017 systemd[1]: Finished dracut-initqueue.service. Dec 16 13:19:24.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.594572 systemd[1]: Reached target remote-fs-pre.target. Dec 16 13:19:24.595292 systemd[1]: Reached target remote-cryptsetup.target. Dec 16 13:19:24.596028 systemd[1]: Reached target remote-fs.target. Dec 16 13:19:24.597806 systemd[1]: Starting dracut-pre-mount.service... Dec 16 13:19:24.605074 ignition[697]: Ignition 2.14.0 Dec 16 13:19:24.605089 ignition[697]: Stage: fetch Dec 16 13:19:24.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.609226 systemd[1]: Finished dracut-pre-mount.service. Dec 16 13:19:24.605298 ignition[697]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:19:24.605326 ignition[697]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:19:24.607941 ignition[697]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:19:24.608124 ignition[697]: parsed url from cmdline: "" Dec 16 13:19:24.608131 ignition[697]: no config URL provided Dec 16 13:19:24.608140 ignition[697]: reading system config file "/usr/lib/ignition/user.ign" Dec 16 13:19:24.608152 ignition[697]: no config at "/usr/lib/ignition/user.ign" Dec 16 13:19:24.608194 ignition[697]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Dec 16 13:19:24.628630 ignition[697]: GET result: OK Dec 16 13:19:24.628768 ignition[697]: parsing config with SHA512: ab30798d4b24cb5c1aaef5dc0170ba3ed5fc8d564eb9a1d84c120cfbf5137af075deea2dce6ff1b3623e4bc5bcce6aeb603715d9e02d547a9cdbd97fb123f1b8 Dec 16 13:19:24.637153 unknown[697]: fetched base config from "system" Dec 16 13:19:24.637170 unknown[697]: fetched base config from "system" Dec 16 13:19:24.637611 ignition[697]: fetch: fetch complete Dec 16 13:19:24.637181 unknown[697]: fetched user config from "digitalocean" Dec 16 13:19:24.637619 ignition[697]: fetch: fetch passed Dec 16 13:19:24.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.639410 systemd[1]: Finished ignition-fetch.service. Dec 16 13:19:24.637890 ignition[697]: Ignition finished successfully Dec 16 13:19:24.641332 systemd[1]: Starting ignition-kargs.service... Dec 16 13:19:24.657364 ignition[715]: Ignition 2.14.0 Dec 16 13:19:24.658335 ignition[715]: Stage: kargs Dec 16 13:19:24.658979 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:19:24.659633 ignition[715]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:19:24.662646 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:19:24.664524 ignition[715]: kargs: kargs passed Dec 16 13:19:24.664627 ignition[715]: Ignition finished successfully Dec 16 13:19:24.666147 systemd[1]: Finished ignition-kargs.service. Dec 16 13:19:24.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.668175 systemd[1]: Starting ignition-disks.service... Dec 16 13:19:24.687743 ignition[720]: Ignition 2.14.0 Dec 16 13:19:24.688820 ignition[720]: Stage: disks Dec 16 13:19:24.689735 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:19:24.690585 ignition[720]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:19:24.694172 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:19:24.696853 ignition[720]: disks: disks passed Dec 16 13:19:24.697796 ignition[720]: Ignition finished successfully Dec 16 13:19:24.699647 systemd[1]: Finished ignition-disks.service. Dec 16 13:19:24.700418 systemd[1]: Reached target initrd-root-device.target. Dec 16 13:19:24.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.700973 systemd[1]: Reached target local-fs-pre.target. Dec 16 13:19:24.701883 systemd[1]: Reached target local-fs.target. Dec 16 13:19:24.702627 systemd[1]: Reached target sysinit.target. Dec 16 13:19:24.703374 systemd[1]: Reached target basic.target. Dec 16 13:19:24.706342 systemd[1]: Starting systemd-fsck-root.service... Dec 16 13:19:24.728050 systemd-fsck[727]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 16 13:19:24.732191 systemd[1]: Finished systemd-fsck-root.service. Dec 16 13:19:24.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.734136 systemd[1]: Mounting sysroot.mount... Dec 16 13:19:24.746285 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 16 13:19:24.746788 systemd[1]: Mounted sysroot.mount. Dec 16 13:19:24.747303 systemd[1]: Reached target initrd-root-fs.target. Dec 16 13:19:24.749799 systemd[1]: Mounting sysroot-usr.mount... Dec 16 13:19:24.751566 systemd[1]: Starting flatcar-digitalocean-network.service... Dec 16 13:19:24.754161 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 16 13:19:24.754688 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 16 13:19:24.754735 systemd[1]: Reached target ignition-diskful.target. Dec 16 13:19:24.758591 systemd[1]: Mounted sysroot-usr.mount. Dec 16 13:19:24.760376 systemd[1]: Starting initrd-setup-root.service... Dec 16 13:19:24.768765 initrd-setup-root[739]: cut: /sysroot/etc/passwd: No such file or directory Dec 16 13:19:24.786416 initrd-setup-root[747]: cut: /sysroot/etc/group: No such file or directory Dec 16 13:19:24.798571 initrd-setup-root[755]: cut: /sysroot/etc/shadow: No such file or directory Dec 16 13:19:24.808469 initrd-setup-root[765]: cut: /sysroot/etc/gshadow: No such file or directory Dec 16 13:19:24.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.882605 systemd[1]: Finished initrd-setup-root.service. Dec 16 13:19:24.884040 systemd[1]: Starting ignition-mount.service... Dec 16 13:19:24.885810 coreos-metadata[734]: Dec 16 13:19:24.884 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Dec 16 13:19:24.892671 systemd[1]: Starting sysroot-boot.service... Dec 16 13:19:24.897441 bash[784]: umount: /sysroot/usr/share/oem: not mounted. Dec 16 13:19:24.903145 coreos-metadata[734]: Dec 16 13:19:24.900 INFO Fetch successful Dec 16 13:19:24.908106 coreos-metadata[734]: Dec 16 13:19:24.908 INFO wrote hostname ci-3510.3.6-6-d620256fda to /sysroot/etc/hostname Dec 16 13:19:24.909373 coreos-metadata[733]: Dec 16 13:19:24.909 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Dec 16 13:19:24.911594 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 16 13:19:24.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.922401 coreos-metadata[733]: Dec 16 13:19:24.922 INFO Fetch successful Dec 16 13:19:24.927035 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Dec 16 13:19:24.927156 systemd[1]: Finished flatcar-digitalocean-network.service. Dec 16 13:19:24.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.929764 ignition[785]: INFO : Ignition 2.14.0 Dec 16 13:19:24.930651 ignition[785]: INFO : Stage: mount Dec 16 13:19:24.931601 ignition[785]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:19:24.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:24.932711 systemd[1]: Finished sysroot-boot.service. Dec 16 13:19:24.934269 ignition[785]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:19:24.938838 ignition[785]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:19:24.941205 ignition[785]: INFO : mount: mount passed Dec 16 13:19:24.941935 ignition[785]: INFO : Ignition finished successfully Dec 16 13:19:24.943379 systemd[1]: Finished ignition-mount.service. Dec 16 13:19:24.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:25.259595 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 16 13:19:25.269306 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (794) Dec 16 13:19:25.269391 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 16 13:19:25.271321 kernel: BTRFS info (device vda6): using free space tree Dec 16 13:19:25.271392 kernel: BTRFS info (device vda6): has skinny extents Dec 16 13:19:25.285990 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 16 13:19:25.289091 systemd[1]: Starting ignition-files.service... Dec 16 13:19:25.317872 ignition[814]: INFO : Ignition 2.14.0 Dec 16 13:19:25.318872 ignition[814]: INFO : Stage: files Dec 16 13:19:25.319659 ignition[814]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:19:25.320448 ignition[814]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:19:25.324826 ignition[814]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:19:25.327957 ignition[814]: DEBUG : files: compiled without relabeling support, skipping Dec 16 13:19:25.329805 ignition[814]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 16 13:19:25.330743 ignition[814]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 16 13:19:25.334658 ignition[814]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 16 13:19:25.335821 ignition[814]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 16 13:19:25.338424 unknown[814]: wrote ssh authorized keys file for user: core Dec 16 13:19:25.339436 ignition[814]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 16 13:19:25.342036 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 16 13:19:25.343414 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 16 13:19:25.344464 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 16 13:19:25.345453 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 16 13:19:25.346590 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 16 13:19:25.346590 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 16 13:19:25.346590 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 16 13:19:25.346590 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 16 13:19:25.698870 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 16 13:19:25.869484 systemd-networkd[690]: eth1: Gained IPv6LL Dec 16 13:19:25.933859 systemd-networkd[690]: eth0: Gained IPv6LL Dec 16 13:19:26.033188 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 16 13:19:26.033188 ignition[814]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 16 13:19:26.033188 ignition[814]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 16 13:19:26.033188 ignition[814]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 16 13:19:26.036379 ignition[814]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 16 13:19:26.040170 ignition[814]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 16 13:19:26.040974 ignition[814]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 16 13:19:26.040974 ignition[814]: INFO : files: files passed Dec 16 13:19:26.040974 ignition[814]: INFO : Ignition finished successfully Dec 16 13:19:26.043605 systemd[1]: Finished ignition-files.service. Dec 16 13:19:26.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.045357 kernel: kauditd_printk_skb: 28 callbacks suppressed Dec 16 13:19:26.045392 kernel: audit: type=1130 audit(1734355166.044:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.045659 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 16 13:19:26.049443 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 16 13:19:26.051433 systemd[1]: Starting ignition-quench.service... Dec 16 13:19:26.056072 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 16 13:19:26.056171 systemd[1]: Finished ignition-quench.service. Dec 16 13:19:26.063581 kernel: audit: type=1130 audit(1734355166.057:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.063623 kernel: audit: type=1131 audit(1734355166.057:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.063727 initrd-setup-root-after-ignition[839]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 16 13:19:26.067171 kernel: audit: type=1130 audit(1734355166.063:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.060764 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 16 13:19:26.064057 systemd[1]: Reached target ignition-complete.target. Dec 16 13:19:26.069462 systemd[1]: Starting initrd-parse-etc.service... Dec 16 13:19:26.090566 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 16 13:19:26.090692 systemd[1]: Finished initrd-parse-etc.service. Dec 16 13:19:26.098552 kernel: audit: type=1130 audit(1734355166.091:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.098607 kernel: audit: type=1131 audit(1734355166.091:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.091773 systemd[1]: Reached target initrd-fs.target. Dec 16 13:19:26.098851 systemd[1]: Reached target initrd.target. Dec 16 13:19:26.099969 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 16 13:19:26.101168 systemd[1]: Starting dracut-pre-pivot.service... Dec 16 13:19:26.121905 systemd[1]: Finished dracut-pre-pivot.service. Dec 16 13:19:26.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.126931 kernel: audit: type=1130 audit(1734355166.122:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.124431 systemd[1]: Starting initrd-cleanup.service... Dec 16 13:19:26.139119 systemd[1]: Stopped target nss-lookup.target. Dec 16 13:19:26.140634 systemd[1]: Stopped target remote-cryptsetup.target. Dec 16 13:19:26.142004 systemd[1]: Stopped target timers.target. Dec 16 13:19:26.143227 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 16 13:19:26.144105 systemd[1]: Stopped dracut-pre-pivot.service. Dec 16 13:19:26.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.149104 systemd[1]: Stopped target initrd.target. Dec 16 13:19:26.150174 kernel: audit: type=1131 audit(1734355166.145:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.149917 systemd[1]: Stopped target basic.target. Dec 16 13:19:26.150515 systemd[1]: Stopped target ignition-complete.target. Dec 16 13:19:26.151381 systemd[1]: Stopped target ignition-diskful.target. Dec 16 13:19:26.152135 systemd[1]: Stopped target initrd-root-device.target. Dec 16 13:19:26.152980 systemd[1]: Stopped target remote-fs.target. Dec 16 13:19:26.153934 systemd[1]: Stopped target remote-fs-pre.target. Dec 16 13:19:26.154581 systemd[1]: Stopped target sysinit.target. Dec 16 13:19:26.155347 systemd[1]: Stopped target local-fs.target. Dec 16 13:19:26.156145 systemd[1]: Stopped target local-fs-pre.target. Dec 16 13:19:26.156935 systemd[1]: Stopped target swap.target. Dec 16 13:19:26.157813 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 16 13:19:26.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.158042 systemd[1]: Stopped dracut-pre-mount.service. Dec 16 13:19:26.162759 kernel: audit: type=1131 audit(1734355166.158:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.158960 systemd[1]: Stopped target cryptsetup.target. Dec 16 13:19:26.162690 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 16 13:19:26.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.162885 systemd[1]: Stopped dracut-initqueue.service. Dec 16 13:19:26.167730 kernel: audit: type=1131 audit(1734355166.163:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.163874 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 16 13:19:26.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.164028 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 16 13:19:26.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.168458 systemd[1]: ignition-files.service: Deactivated successfully. Dec 16 13:19:26.168614 systemd[1]: Stopped ignition-files.service. Dec 16 13:19:26.169319 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 16 13:19:26.169477 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 16 13:19:26.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.181539 systemd[1]: Stopping ignition-mount.service... Dec 16 13:19:26.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.182648 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 16 13:19:26.183024 systemd[1]: Stopped kmod-static-nodes.service. Dec 16 13:19:26.184735 systemd[1]: Stopping sysroot-boot.service... Dec 16 13:19:26.185326 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 16 13:19:26.185672 systemd[1]: Stopped systemd-udev-trigger.service. Dec 16 13:19:26.186487 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 16 13:19:26.186647 systemd[1]: Stopped dracut-pre-trigger.service. Dec 16 13:19:26.191460 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 16 13:19:26.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.191676 systemd[1]: Finished initrd-cleanup.service. Dec 16 13:19:26.202425 ignition[852]: INFO : Ignition 2.14.0 Dec 16 13:19:26.202425 ignition[852]: INFO : Stage: umount Dec 16 13:19:26.202425 ignition[852]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:19:26.202425 ignition[852]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:19:26.207574 ignition[852]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:19:26.207574 ignition[852]: INFO : umount: umount passed Dec 16 13:19:26.207574 ignition[852]: INFO : Ignition finished successfully Dec 16 13:19:26.210452 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 16 13:19:26.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.210572 systemd[1]: Stopped ignition-mount.service. Dec 16 13:19:26.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.211322 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 16 13:19:26.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.211394 systemd[1]: Stopped ignition-disks.service. Dec 16 13:19:26.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.211989 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 16 13:19:26.212045 systemd[1]: Stopped ignition-kargs.service. Dec 16 13:19:26.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.212783 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 16 13:19:26.212826 systemd[1]: Stopped ignition-fetch.service. Dec 16 13:19:26.214275 systemd[1]: Stopped target network.target. Dec 16 13:19:26.214938 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 16 13:19:26.214994 systemd[1]: Stopped ignition-fetch-offline.service. Dec 16 13:19:26.215823 systemd[1]: Stopped target paths.target. Dec 16 13:19:26.216538 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 16 13:19:26.218335 systemd[1]: Stopped systemd-ask-password-console.path. Dec 16 13:19:26.218910 systemd[1]: Stopped target slices.target. Dec 16 13:19:26.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.219737 systemd[1]: Stopped target sockets.target. Dec 16 13:19:26.220544 systemd[1]: iscsid.socket: Deactivated successfully. Dec 16 13:19:26.220586 systemd[1]: Closed iscsid.socket. Dec 16 13:19:26.221370 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 16 13:19:26.221398 systemd[1]: Closed iscsiuio.socket. Dec 16 13:19:26.222617 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 16 13:19:26.222683 systemd[1]: Stopped ignition-setup.service. Dec 16 13:19:26.233607 systemd[1]: Stopping systemd-networkd.service... Dec 16 13:19:26.234517 systemd[1]: Stopping systemd-resolved.service... Dec 16 13:19:26.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.236940 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 16 13:19:26.237443 systemd-networkd[690]: eth1: DHCPv6 lease lost Dec 16 13:19:26.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.249484 systemd-networkd[690]: eth0: DHCPv6 lease lost Dec 16 13:19:26.254000 audit: BPF prog-id=6 op=UNLOAD Dec 16 13:19:26.250538 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 16 13:19:26.260000 audit: BPF prog-id=9 op=UNLOAD Dec 16 13:19:26.250737 systemd[1]: Stopped systemd-resolved.service. Dec 16 13:19:26.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.252991 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 16 13:19:26.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.253116 systemd[1]: Stopped systemd-networkd.service. Dec 16 13:19:26.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.254323 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 16 13:19:26.254365 systemd[1]: Closed systemd-networkd.socket. Dec 16 13:19:26.256811 systemd[1]: Stopping network-cleanup.service... Dec 16 13:19:26.261149 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 16 13:19:26.261266 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 16 13:19:26.262132 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 16 13:19:26.262221 systemd[1]: Stopped systemd-sysctl.service. Dec 16 13:19:26.262916 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 16 13:19:26.262981 systemd[1]: Stopped systemd-modules-load.service. Dec 16 13:19:26.263599 systemd[1]: Stopping systemd-udevd.service... Dec 16 13:19:26.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.276573 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 16 13:19:26.277428 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 16 13:19:26.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.277607 systemd[1]: Stopped systemd-udevd.service. Dec 16 13:19:26.278894 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 16 13:19:26.279029 systemd[1]: Stopped sysroot-boot.service. Dec 16 13:19:26.281299 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 16 13:19:26.281374 systemd[1]: Closed systemd-udevd-control.socket. Dec 16 13:19:26.282388 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 16 13:19:26.282433 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 16 13:19:26.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.282903 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 16 13:19:26.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.282978 systemd[1]: Stopped dracut-pre-udev.service. Dec 16 13:19:26.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.286339 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 16 13:19:26.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.286435 systemd[1]: Stopped dracut-cmdline.service. Dec 16 13:19:26.286861 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 16 13:19:26.286910 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 16 13:19:26.287511 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 16 13:19:26.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.287555 systemd[1]: Stopped initrd-setup-root.service. Dec 16 13:19:26.289219 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 16 13:19:26.289890 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 16 13:19:26.289950 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 16 13:19:26.291373 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 16 13:19:26.291506 systemd[1]: Stopped network-cleanup.service. Dec 16 13:19:26.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.300607 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 16 13:19:26.300729 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 16 13:19:26.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:26.302052 systemd[1]: Reached target initrd-switch-root.target. Dec 16 13:19:26.304026 systemd[1]: Starting initrd-switch-root.service... Dec 16 13:19:26.318866 systemd[1]: Switching root. Dec 16 13:19:26.343609 iscsid[695]: iscsid shutting down. Dec 16 13:19:26.344307 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Dec 16 13:19:26.344371 systemd-journald[185]: Journal stopped Dec 16 13:19:29.806643 kernel: SELinux: Class mctp_socket not defined in policy. Dec 16 13:19:29.806717 kernel: SELinux: Class anon_inode not defined in policy. Dec 16 13:19:29.806731 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 16 13:19:29.806748 kernel: SELinux: policy capability network_peer_controls=1 Dec 16 13:19:29.806760 kernel: SELinux: policy capability open_perms=1 Dec 16 13:19:29.806772 kernel: SELinux: policy capability extended_socket_class=1 Dec 16 13:19:29.806788 kernel: SELinux: policy capability always_check_network=0 Dec 16 13:19:29.806804 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 16 13:19:29.806815 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 16 13:19:29.806832 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 16 13:19:29.806848 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 16 13:19:29.806862 systemd[1]: Successfully loaded SELinux policy in 49.616ms. Dec 16 13:19:29.806882 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.741ms. Dec 16 13:19:29.806896 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 16 13:19:29.806909 systemd[1]: Detected virtualization kvm. Dec 16 13:19:29.806925 systemd[1]: Detected architecture x86-64. Dec 16 13:19:29.806937 systemd[1]: Detected first boot. Dec 16 13:19:29.806950 systemd[1]: Hostname set to . Dec 16 13:19:29.806965 systemd[1]: Initializing machine ID from VM UUID. Dec 16 13:19:29.806978 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 16 13:19:29.806990 systemd[1]: Populated /etc with preset unit settings. Dec 16 13:19:29.807007 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 16 13:19:29.811275 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 16 13:19:29.811313 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 16 13:19:29.811333 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 16 13:19:29.811351 systemd[1]: Stopped iscsiuio.service. Dec 16 13:19:29.811368 systemd[1]: iscsid.service: Deactivated successfully. Dec 16 13:19:29.811387 systemd[1]: Stopped iscsid.service. Dec 16 13:19:29.811409 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 16 13:19:29.811427 systemd[1]: Stopped initrd-switch-root.service. Dec 16 13:19:29.811446 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 16 13:19:29.811464 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 16 13:19:29.811479 systemd[1]: Created slice system-addon\x2drun.slice. Dec 16 13:19:29.811491 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 16 13:19:29.811504 systemd[1]: Created slice system-getty.slice. Dec 16 13:19:29.811516 systemd[1]: Created slice system-modprobe.slice. Dec 16 13:19:29.811531 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 16 13:19:29.811549 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 16 13:19:29.811562 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 16 13:19:29.811574 systemd[1]: Created slice user.slice. Dec 16 13:19:29.811587 systemd[1]: Started systemd-ask-password-console.path. Dec 16 13:19:29.811600 systemd[1]: Started systemd-ask-password-wall.path. Dec 16 13:19:29.811614 systemd[1]: Set up automount boot.automount. Dec 16 13:19:29.811632 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 16 13:19:29.811644 systemd[1]: Stopped target initrd-switch-root.target. Dec 16 13:19:29.811656 systemd[1]: Stopped target initrd-fs.target. Dec 16 13:19:29.811668 systemd[1]: Stopped target initrd-root-fs.target. Dec 16 13:19:29.811681 systemd[1]: Reached target integritysetup.target. Dec 16 13:19:29.811693 systemd[1]: Reached target remote-cryptsetup.target. Dec 16 13:19:29.811706 systemd[1]: Reached target remote-fs.target. Dec 16 13:19:29.811718 systemd[1]: Reached target slices.target. Dec 16 13:19:29.811733 systemd[1]: Reached target swap.target. Dec 16 13:19:29.811745 systemd[1]: Reached target torcx.target. Dec 16 13:19:29.811756 systemd[1]: Reached target veritysetup.target. Dec 16 13:19:29.811768 systemd[1]: Listening on systemd-coredump.socket. Dec 16 13:19:29.811781 systemd[1]: Listening on systemd-initctl.socket. Dec 16 13:19:29.811793 systemd[1]: Listening on systemd-networkd.socket. Dec 16 13:19:29.811805 systemd[1]: Listening on systemd-udevd-control.socket. Dec 16 13:19:29.811817 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 16 13:19:29.811829 systemd[1]: Listening on systemd-userdbd.socket. Dec 16 13:19:29.811841 systemd[1]: Mounting dev-hugepages.mount... Dec 16 13:19:29.811855 systemd[1]: Mounting dev-mqueue.mount... Dec 16 13:19:29.811868 systemd[1]: Mounting media.mount... Dec 16 13:19:29.811881 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:19:29.811894 systemd[1]: Mounting sys-kernel-debug.mount... Dec 16 13:19:29.811907 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 16 13:19:29.811919 systemd[1]: Mounting tmp.mount... Dec 16 13:19:29.811932 systemd[1]: Starting flatcar-tmpfiles.service... Dec 16 13:19:29.811944 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:19:29.811957 systemd[1]: Starting kmod-static-nodes.service... Dec 16 13:19:29.811971 systemd[1]: Starting modprobe@configfs.service... Dec 16 13:19:29.811986 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:19:29.812004 systemd[1]: Starting modprobe@drm.service... Dec 16 13:19:29.812021 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:19:29.812035 systemd[1]: Starting modprobe@fuse.service... Dec 16 13:19:29.812047 systemd[1]: Starting modprobe@loop.service... Dec 16 13:19:29.812060 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 16 13:19:29.812072 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 16 13:19:29.812084 systemd[1]: Stopped systemd-fsck-root.service. Dec 16 13:19:29.812098 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 16 13:19:29.815304 systemd[1]: Stopped systemd-fsck-usr.service. Dec 16 13:19:29.815375 systemd[1]: Stopped systemd-journald.service. Dec 16 13:19:29.815396 systemd[1]: Starting systemd-journald.service... Dec 16 13:19:29.815414 systemd[1]: Starting systemd-modules-load.service... Dec 16 13:19:29.815433 systemd[1]: Starting systemd-network-generator.service... Dec 16 13:19:29.816229 systemd[1]: Starting systemd-remount-fs.service... Dec 16 13:19:29.816263 systemd[1]: Starting systemd-udev-trigger.service... Dec 16 13:19:29.816279 systemd[1]: verity-setup.service: Deactivated successfully. Dec 16 13:19:29.816298 systemd[1]: Stopped verity-setup.service. Dec 16 13:19:29.816312 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:19:29.816325 systemd[1]: Mounted dev-hugepages.mount. Dec 16 13:19:29.816337 systemd[1]: Mounted dev-mqueue.mount. Dec 16 13:19:29.816349 systemd[1]: Mounted media.mount. Dec 16 13:19:29.816361 systemd[1]: Mounted sys-kernel-debug.mount. Dec 16 13:19:29.816373 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 16 13:19:29.816385 systemd[1]: Mounted tmp.mount. Dec 16 13:19:29.816397 systemd[1]: Finished kmod-static-nodes.service. Dec 16 13:19:29.816412 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 16 13:19:29.816426 kernel: loop: module loaded Dec 16 13:19:29.816439 systemd[1]: Finished modprobe@configfs.service. Dec 16 13:19:29.816452 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:19:29.816464 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:19:29.816478 kernel: fuse: init (API version 7.34) Dec 16 13:19:29.816490 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 16 13:19:29.816503 systemd[1]: Finished modprobe@drm.service. Dec 16 13:19:29.816517 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:19:29.816529 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:19:29.816541 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 16 13:19:29.816553 systemd[1]: Finished modprobe@fuse.service. Dec 16 13:19:29.816566 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 16 13:19:29.816578 systemd[1]: Finished modprobe@loop.service. Dec 16 13:19:29.816593 systemd[1]: Finished systemd-modules-load.service. Dec 16 13:19:29.816606 systemd[1]: Finished systemd-network-generator.service. Dec 16 13:19:29.816618 systemd[1]: Finished systemd-remount-fs.service. Dec 16 13:19:29.816630 systemd[1]: Reached target network-pre.target. Dec 16 13:19:29.816643 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 16 13:19:29.816655 systemd[1]: Mounting sys-kernel-config.mount... Dec 16 13:19:29.816669 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 16 13:19:29.816691 systemd-journald[954]: Journal started Dec 16 13:19:29.816759 systemd-journald[954]: Runtime Journal (/run/log/journal/76edb9a4b0864015a61880e2fbc85686) is 4.9M, max 39.5M, 34.5M free. Dec 16 13:19:26.495000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 16 13:19:26.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 16 13:19:26.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 16 13:19:26.554000 audit: BPF prog-id=10 op=LOAD Dec 16 13:19:26.554000 audit: BPF prog-id=10 op=UNLOAD Dec 16 13:19:26.554000 audit: BPF prog-id=11 op=LOAD Dec 16 13:19:26.554000 audit: BPF prog-id=11 op=UNLOAD Dec 16 13:19:26.653000 audit[884]: AVC avc: denied { associate } for pid=884 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 16 13:19:26.653000 audit[884]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=867 pid=884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:26.653000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 16 13:19:26.670000 audit[884]: AVC avc: denied { associate } for pid=884 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 16 13:19:26.670000 audit[884]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859a9 a2=1ed a3=0 items=2 ppid=867 pid=884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:26.670000 audit: CWD cwd="/" Dec 16 13:19:26.670000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:26.670000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:26.670000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 16 13:19:29.600000 audit: BPF prog-id=12 op=LOAD Dec 16 13:19:29.600000 audit: BPF prog-id=3 op=UNLOAD Dec 16 13:19:29.600000 audit: BPF prog-id=13 op=LOAD Dec 16 13:19:29.600000 audit: BPF prog-id=14 op=LOAD Dec 16 13:19:29.600000 audit: BPF prog-id=4 op=UNLOAD Dec 16 13:19:29.600000 audit: BPF prog-id=5 op=UNLOAD Dec 16 13:19:29.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.614000 audit: BPF prog-id=12 op=UNLOAD Dec 16 13:19:29.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.715000 audit: BPF prog-id=15 op=LOAD Dec 16 13:19:29.716000 audit: BPF prog-id=16 op=LOAD Dec 16 13:19:29.716000 audit: BPF prog-id=17 op=LOAD Dec 16 13:19:29.716000 audit: BPF prog-id=13 op=UNLOAD Dec 16 13:19:29.716000 audit: BPF prog-id=14 op=UNLOAD Dec 16 13:19:29.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.804000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 16 13:19:29.804000 audit[954]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff65850c50 a2=4000 a3=7fff65850cec items=0 ppid=1 pid=954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:29.804000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 16 13:19:29.597825 systemd[1]: Queued start job for default target multi-user.target. Dec 16 13:19:26.651177 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 16 13:19:29.597842 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 16 13:19:26.651688 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 16 13:19:29.602236 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 16 13:19:26.651710 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 16 13:19:29.819305 systemd[1]: Starting systemd-hwdb-update.service... Dec 16 13:19:26.651745 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 16 13:19:26.651755 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 16 13:19:26.651794 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 16 13:19:26.651808 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 16 13:19:26.652043 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 16 13:19:26.652109 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 16 13:19:26.652133 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 16 13:19:26.652748 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 16 13:19:26.652789 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 16 13:19:26.652809 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 16 13:19:26.652824 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 16 13:19:26.652843 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 16 13:19:26.652857 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 16 13:19:29.155980 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:29Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 16 13:19:29.156270 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:29Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 16 13:19:29.156414 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:29Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 16 13:19:29.156628 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:29Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 16 13:19:29.156684 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:29Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 16 13:19:29.156756 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-12-16T13:19:29Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 16 13:19:29.821721 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 16 13:19:29.827284 systemd[1]: Starting systemd-random-seed.service... Dec 16 13:19:29.827360 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 16 13:19:29.836306 systemd[1]: Starting systemd-sysctl.service... Dec 16 13:19:29.836391 systemd[1]: Started systemd-journald.service. Dec 16 13:19:29.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.838367 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 16 13:19:29.838865 systemd[1]: Mounted sys-kernel-config.mount. Dec 16 13:19:29.852176 systemd-journald[954]: Time spent on flushing to /var/log/journal/76edb9a4b0864015a61880e2fbc85686 is 40.115ms for 1121 entries. Dec 16 13:19:29.852176 systemd-journald[954]: System Journal (/var/log/journal/76edb9a4b0864015a61880e2fbc85686) is 8.0M, max 195.6M, 187.6M free. Dec 16 13:19:29.915960 systemd-journald[954]: Received client request to flush runtime journal. Dec 16 13:19:29.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.841716 systemd[1]: Starting systemd-journal-flush.service... Dec 16 13:19:29.856400 systemd[1]: Finished systemd-random-seed.service. Dec 16 13:19:29.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.856922 systemd[1]: Reached target first-boot-complete.target. Dec 16 13:19:29.872697 systemd[1]: Finished systemd-sysctl.service. Dec 16 13:19:29.897235 systemd[1]: Finished flatcar-tmpfiles.service. Dec 16 13:19:29.899160 systemd[1]: Starting systemd-sysusers.service... Dec 16 13:19:29.917132 systemd[1]: Finished systemd-journal-flush.service. Dec 16 13:19:29.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.923571 systemd[1]: Finished systemd-udev-trigger.service. Dec 16 13:19:29.925646 systemd[1]: Starting systemd-udev-settle.service... Dec 16 13:19:29.937933 udevadm[994]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 16 13:19:29.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:29.948960 systemd[1]: Finished systemd-sysusers.service. Dec 16 13:19:30.557809 systemd[1]: Finished systemd-hwdb-update.service. Dec 16 13:19:30.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:30.559000 audit: BPF prog-id=18 op=LOAD Dec 16 13:19:30.559000 audit: BPF prog-id=19 op=LOAD Dec 16 13:19:30.559000 audit: BPF prog-id=7 op=UNLOAD Dec 16 13:19:30.560000 audit: BPF prog-id=8 op=UNLOAD Dec 16 13:19:30.561781 systemd[1]: Starting systemd-udevd.service... Dec 16 13:19:30.585837 systemd-udevd[995]: Using default interface naming scheme 'v252'. Dec 16 13:19:30.612215 systemd[1]: Started systemd-udevd.service. Dec 16 13:19:30.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:30.614000 audit: BPF prog-id=20 op=LOAD Dec 16 13:19:30.619788 systemd[1]: Starting systemd-networkd.service... Dec 16 13:19:30.629000 audit: BPF prog-id=21 op=LOAD Dec 16 13:19:30.629000 audit: BPF prog-id=22 op=LOAD Dec 16 13:19:30.629000 audit: BPF prog-id=23 op=LOAD Dec 16 13:19:30.630941 systemd[1]: Starting systemd-userdbd.service... Dec 16 13:19:30.688203 systemd[1]: Started systemd-userdbd.service. Dec 16 13:19:30.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:30.700014 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:19:30.700367 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:19:30.702215 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:19:30.706288 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:19:30.708993 systemd[1]: Starting modprobe@loop.service... Dec 16 13:19:30.711379 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 16 13:19:30.711491 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 16 13:19:30.711630 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:19:30.712348 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 16 13:19:30.712538 systemd[1]: Finished modprobe@loop.service. Dec 16 13:19:30.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:30.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:30.726835 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:19:30.727060 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:19:30.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:30.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:30.727955 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 16 13:19:30.728510 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:19:30.728694 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:19:30.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:30.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:30.729405 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 16 13:19:30.750162 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 16 13:19:30.809950 systemd-networkd[1008]: lo: Link UP Dec 16 13:19:30.809964 systemd-networkd[1008]: lo: Gained carrier Dec 16 13:19:30.810864 systemd-networkd[1008]: Enumeration completed Dec 16 13:19:30.811051 systemd[1]: Started systemd-networkd.service. Dec 16 13:19:30.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:30.813194 systemd-networkd[1008]: eth1: Configuring with /run/systemd/network/10-02:2c:71:6b:c7:9c.network. Dec 16 13:19:30.814871 systemd-networkd[1008]: eth0: Configuring with /run/systemd/network/10-b6:2d:17:5b:75:dd.network. Dec 16 13:19:30.815829 systemd-networkd[1008]: eth1: Link UP Dec 16 13:19:30.815843 systemd-networkd[1008]: eth1: Gained carrier Dec 16 13:19:30.818735 systemd-networkd[1008]: eth0: Link UP Dec 16 13:19:30.818748 systemd-networkd[1008]: eth0: Gained carrier Dec 16 13:19:30.829072 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 16 13:19:30.834378 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 16 13:19:30.843275 kernel: ACPI: button: Power Button [PWRF] Dec 16 13:19:30.853000 audit[1009]: AVC avc: denied { confidentiality } for pid=1009 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 16 13:19:30.853000 audit[1009]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556ef9ad0820 a1=337fc a2=7fd9d2771bc5 a3=5 items=110 ppid=995 pid=1009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:30.853000 audit: CWD cwd="/" Dec 16 13:19:30.853000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=1 name=(null) inode=14869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=2 name=(null) inode=14869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=3 name=(null) inode=14870 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=4 name=(null) inode=14869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=5 name=(null) inode=14871 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=6 name=(null) inode=14869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=7 name=(null) inode=14872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=8 name=(null) inode=14872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=9 name=(null) inode=14873 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=10 name=(null) inode=14872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=11 name=(null) inode=14874 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=12 name=(null) inode=14872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=13 name=(null) inode=14875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=14 name=(null) inode=14872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=15 name=(null) inode=14876 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=16 name=(null) inode=14872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=17 name=(null) inode=14877 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=18 name=(null) inode=14869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=19 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=20 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=21 name=(null) inode=14879 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=22 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=23 name=(null) inode=14880 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=24 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=25 name=(null) inode=14881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=26 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=27 name=(null) inode=14882 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=28 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=29 name=(null) inode=14883 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=30 name=(null) inode=14869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=31 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=32 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=33 name=(null) inode=14885 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=34 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=35 name=(null) inode=14886 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=36 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=37 name=(null) inode=14887 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=38 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=39 name=(null) inode=14888 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=40 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=41 name=(null) inode=14889 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=42 name=(null) inode=14869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=43 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=44 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=45 name=(null) inode=14891 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=46 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=47 name=(null) inode=14892 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=48 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=49 name=(null) inode=14893 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=50 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=51 name=(null) inode=14894 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=52 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=53 name=(null) inode=14895 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=55 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=56 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=57 name=(null) inode=14897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=58 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=59 name=(null) inode=14898 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=60 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=61 name=(null) inode=14899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=62 name=(null) inode=14899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=63 name=(null) inode=14900 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=64 name=(null) inode=14899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=65 name=(null) inode=14901 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=66 name=(null) inode=14899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=67 name=(null) inode=14902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=68 name=(null) inode=14899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=69 name=(null) inode=14903 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=70 name=(null) inode=14899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=71 name=(null) inode=14904 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=72 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=73 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=74 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=75 name=(null) inode=14906 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=76 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=77 name=(null) inode=14907 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=78 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=79 name=(null) inode=14908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=80 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=81 name=(null) inode=14909 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=82 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=83 name=(null) inode=14910 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=84 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=85 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=86 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=87 name=(null) inode=14912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=88 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=89 name=(null) inode=14913 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=90 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=91 name=(null) inode=14914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=92 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=93 name=(null) inode=14915 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=94 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=95 name=(null) inode=14916 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=96 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=97 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=98 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=99 name=(null) inode=14918 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=100 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=101 name=(null) inode=14919 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=102 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=103 name=(null) inode=14920 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=104 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=105 name=(null) inode=14921 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=106 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=107 name=(null) inode=14922 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PATH item=109 name=(null) inode=14923 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:30.853000 audit: PROCTITLE proctitle="(udev-worker)" Dec 16 13:19:30.889267 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 16 13:19:30.897672 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 16 13:19:30.913265 kernel: mousedev: PS/2 mouse device common for all mice Dec 16 13:19:31.018267 kernel: EDAC MC: Ver: 3.0.0 Dec 16 13:19:31.042194 systemd[1]: Finished systemd-udev-settle.service. Dec 16 13:19:31.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.044756 systemd[1]: Starting lvm2-activation-early.service... Dec 16 13:19:31.066305 lvm[1033]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 16 13:19:31.099615 systemd[1]: Finished lvm2-activation-early.service. Dec 16 13:19:31.101328 kernel: kauditd_printk_skb: 228 callbacks suppressed Dec 16 13:19:31.101438 kernel: audit: type=1130 audit(1734355171.099:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.100234 systemd[1]: Reached target cryptsetup.target. Dec 16 13:19:31.105501 systemd[1]: Starting lvm2-activation.service... Dec 16 13:19:31.111434 lvm[1034]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 16 13:19:31.134973 systemd[1]: Finished lvm2-activation.service. Dec 16 13:19:31.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.135582 systemd[1]: Reached target local-fs-pre.target. Dec 16 13:19:31.139309 kernel: audit: type=1130 audit(1734355171.135:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.140528 systemd[1]: Mounting media-configdrive.mount... Dec 16 13:19:31.140958 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 16 13:19:31.141017 systemd[1]: Reached target machines.target. Dec 16 13:19:31.142849 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 16 13:19:31.156026 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 16 13:19:31.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.161312 kernel: audit: type=1130 audit(1734355171.156:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.161416 kernel: ISO 9660 Extensions: RRIP_1991A Dec 16 13:19:31.161991 systemd[1]: Mounted media-configdrive.mount. Dec 16 13:19:31.162482 systemd[1]: Reached target local-fs.target. Dec 16 13:19:31.164104 systemd[1]: Starting ldconfig.service... Dec 16 13:19:31.165386 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 16 13:19:31.165445 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:19:31.168746 systemd[1]: Starting systemd-boot-update.service... Dec 16 13:19:31.172218 systemd[1]: Starting systemd-machine-id-commit.service... Dec 16 13:19:31.177246 systemd[1]: Starting systemd-sysext.service... Dec 16 13:19:31.181410 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1040 (bootctl) Dec 16 13:19:31.183105 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 16 13:19:31.194117 systemd[1]: Unmounting usr-share-oem.mount... Dec 16 13:19:31.202805 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 16 13:19:31.202993 systemd[1]: Unmounted usr-share-oem.mount. Dec 16 13:19:31.223374 kernel: loop0: detected capacity change from 0 to 205544 Dec 16 13:19:31.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.272506 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 16 13:19:31.273379 systemd[1]: Finished systemd-machine-id-commit.service. Dec 16 13:19:31.277308 kernel: audit: type=1130 audit(1734355171.273:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.302483 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 16 13:19:31.316013 systemd-fsck[1047]: fsck.fat 4.2 (2021-01-31) Dec 16 13:19:31.316013 systemd-fsck[1047]: /dev/vda1: 789 files, 119291/258078 clusters Dec 16 13:19:31.319301 kernel: loop1: detected capacity change from 0 to 205544 Dec 16 13:19:31.325948 kernel: audit: type=1130 audit(1734355171.321:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.321502 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 16 13:19:31.323844 systemd[1]: Mounting boot.mount... Dec 16 13:19:31.338108 systemd[1]: Mounted boot.mount. Dec 16 13:19:31.343292 (sd-sysext)[1051]: Using extensions 'kubernetes'. Dec 16 13:19:31.345533 (sd-sysext)[1051]: Merged extensions into '/usr'. Dec 16 13:19:31.372732 systemd[1]: Finished systemd-boot-update.service. Dec 16 13:19:31.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.377345 kernel: audit: type=1130 audit(1734355171.373:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.373955 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:19:31.375859 systemd[1]: Mounting usr-share-oem.mount... Dec 16 13:19:31.379982 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:19:31.384424 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:19:31.387554 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:19:31.391178 systemd[1]: Starting modprobe@loop.service... Dec 16 13:19:31.392608 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 16 13:19:31.392802 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:19:31.393044 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:19:31.397417 systemd[1]: Mounted usr-share-oem.mount. Dec 16 13:19:31.399316 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:19:31.399466 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:19:31.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.400524 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:19:31.400648 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:19:31.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.405954 kernel: audit: type=1130 audit(1734355171.399:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.406061 kernel: audit: type=1131 audit(1734355171.399:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.407670 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 16 13:19:31.407915 systemd[1]: Finished modprobe@loop.service. Dec 16 13:19:31.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.412407 kernel: audit: type=1130 audit(1734355171.406:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.412482 kernel: audit: type=1131 audit(1734355171.406:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.413944 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 16 13:19:31.414174 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 16 13:19:31.415594 systemd[1]: Finished systemd-sysext.service. Dec 16 13:19:31.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.418227 systemd[1]: Starting ensure-sysext.service... Dec 16 13:19:31.425825 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 16 13:19:31.432448 systemd[1]: Reloading. Dec 16 13:19:31.454046 systemd-tmpfiles[1059]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 16 13:19:31.465093 systemd-tmpfiles[1059]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 16 13:19:31.480679 systemd-tmpfiles[1059]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 16 13:19:31.569257 /usr/lib/systemd/system-generators/torcx-generator[1078]: time="2024-12-16T13:19:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 16 13:19:31.587974 /usr/lib/systemd/system-generators/torcx-generator[1078]: time="2024-12-16T13:19:31Z" level=info msg="torcx already run" Dec 16 13:19:31.645292 ldconfig[1039]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 16 13:19:31.754351 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 16 13:19:31.754389 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 16 13:19:31.790903 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 16 13:19:31.902000 audit: BPF prog-id=24 op=LOAD Dec 16 13:19:31.902000 audit: BPF prog-id=15 op=UNLOAD Dec 16 13:19:31.903000 audit: BPF prog-id=25 op=LOAD Dec 16 13:19:31.903000 audit: BPF prog-id=26 op=LOAD Dec 16 13:19:31.903000 audit: BPF prog-id=16 op=UNLOAD Dec 16 13:19:31.903000 audit: BPF prog-id=17 op=UNLOAD Dec 16 13:19:31.904000 audit: BPF prog-id=27 op=LOAD Dec 16 13:19:31.904000 audit: BPF prog-id=21 op=UNLOAD Dec 16 13:19:31.904000 audit: BPF prog-id=28 op=LOAD Dec 16 13:19:31.904000 audit: BPF prog-id=29 op=LOAD Dec 16 13:19:31.904000 audit: BPF prog-id=22 op=UNLOAD Dec 16 13:19:31.904000 audit: BPF prog-id=23 op=UNLOAD Dec 16 13:19:31.906000 audit: BPF prog-id=30 op=LOAD Dec 16 13:19:31.906000 audit: BPF prog-id=20 op=UNLOAD Dec 16 13:19:31.909000 audit: BPF prog-id=31 op=LOAD Dec 16 13:19:31.909000 audit: BPF prog-id=32 op=LOAD Dec 16 13:19:31.909000 audit: BPF prog-id=18 op=UNLOAD Dec 16 13:19:31.909000 audit: BPF prog-id=19 op=UNLOAD Dec 16 13:19:31.916095 systemd[1]: Finished ldconfig.service. Dec 16 13:19:31.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.919390 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 16 13:19:31.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.925723 systemd[1]: Starting audit-rules.service... Dec 16 13:19:31.928681 systemd[1]: Starting clean-ca-certificates.service... Dec 16 13:19:31.932835 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 16 13:19:31.935000 audit: BPF prog-id=33 op=LOAD Dec 16 13:19:31.940644 systemd[1]: Starting systemd-resolved.service... Dec 16 13:19:31.942000 audit: BPF prog-id=34 op=LOAD Dec 16 13:19:31.945065 systemd[1]: Starting systemd-timesyncd.service... Dec 16 13:19:31.950481 systemd[1]: Starting systemd-update-utmp.service... Dec 16 13:19:31.958930 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:19:31.966753 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:19:31.970708 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:19:31.975828 systemd[1]: Starting modprobe@loop.service... Dec 16 13:19:31.976590 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 16 13:19:31.976876 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:19:31.980904 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:19:31.981195 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:19:31.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.982549 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:19:31.982763 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:19:31.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.985037 systemd[1]: Finished clean-ca-certificates.service. Dec 16 13:19:31.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.986624 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 16 13:19:31.987463 systemd[1]: Finished modprobe@loop.service. Dec 16 13:19:31.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:31.992212 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:19:31.996609 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:19:32.000659 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:19:32.005521 systemd[1]: Starting modprobe@loop.service... Dec 16 13:19:32.006343 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 16 13:19:32.006604 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:19:32.006848 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 16 13:19:32.008952 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 16 13:19:32.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.011904 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:19:32.012120 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:19:32.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.013495 systemd-networkd[1008]: eth1: Gained IPv6LL Dec 16 13:19:32.014004 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:19:32.014217 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:19:32.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.017009 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 16 13:19:32.017227 systemd[1]: Finished modprobe@loop.service. Dec 16 13:19:32.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.027609 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:19:32.031862 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:19:32.035776 systemd[1]: Starting modprobe@drm.service... Dec 16 13:19:32.037000 audit[1135]: SYSTEM_BOOT pid=1135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.039927 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:19:32.044941 systemd[1]: Starting modprobe@loop.service... Dec 16 13:19:32.045764 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 16 13:19:32.045989 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:19:32.048638 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 16 13:19:32.053306 systemd[1]: Starting systemd-update-done.service... Dec 16 13:19:32.054075 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 16 13:19:32.056742 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:19:32.057005 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:19:32.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.061142 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 16 13:19:32.061363 systemd[1]: Finished modprobe@drm.service. Dec 16 13:19:32.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.064976 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:19:32.065201 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:19:32.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.066878 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 16 13:19:32.067105 systemd[1]: Finished modprobe@loop.service. Dec 16 13:19:32.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.072979 systemd[1]: Finished ensure-sysext.service. Dec 16 13:19:32.078934 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 16 13:19:32.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.083491 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 16 13:19:32.083722 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 16 13:19:32.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:32.083000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 16 13:19:32.083000 audit[1158]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdaa651210 a2=420 a3=0 items=0 ppid=1126 pid=1158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:32.083000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 16 13:19:32.085086 augenrules[1158]: No rules Dec 16 13:19:32.085876 systemd[1]: Finished audit-rules.service. Dec 16 13:19:32.086976 systemd[1]: Finished systemd-update-utmp.service. Dec 16 13:19:32.089981 systemd[1]: Finished systemd-update-done.service. Dec 16 13:19:32.096870 systemd[1]: Started systemd-timesyncd.service. Dec 16 13:19:32.097925 systemd[1]: Reached target time-set.target. Dec 16 13:19:32.805474 systemd-timesyncd[1133]: Contacted time server 199.68.201.235:123 (0.flatcar.pool.ntp.org). Dec 16 13:19:32.805952 systemd-timesyncd[1133]: Initial clock synchronization to Mon 2024-12-16 13:19:32.805303 UTC. Dec 16 13:19:32.840741 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:19:32.840777 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:19:32.848337 systemd-resolved[1130]: Positive Trust Anchors: Dec 16 13:19:32.848355 systemd-resolved[1130]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 16 13:19:32.848387 systemd-resolved[1130]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 16 13:19:32.856511 systemd-resolved[1130]: Using system hostname 'ci-3510.3.6-6-d620256fda'. Dec 16 13:19:32.858768 systemd[1]: Started systemd-resolved.service. Dec 16 13:19:32.859555 systemd[1]: Reached target network.target. Dec 16 13:19:32.860059 systemd[1]: Reached target network-online.target. Dec 16 13:19:32.860573 systemd[1]: Reached target nss-lookup.target. Dec 16 13:19:32.861095 systemd[1]: Reached target sysinit.target. Dec 16 13:19:32.873623 systemd[1]: Started motdgen.path. Dec 16 13:19:32.874030 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 16 13:19:32.874634 systemd[1]: Started logrotate.timer. Dec 16 13:19:32.875078 systemd[1]: Started mdadm.timer. Dec 16 13:19:32.875556 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 16 13:19:32.875911 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 16 13:19:32.875947 systemd[1]: Reached target paths.target. Dec 16 13:19:32.876248 systemd[1]: Reached target timers.target. Dec 16 13:19:32.876949 systemd[1]: Listening on dbus.socket. Dec 16 13:19:32.878473 systemd[1]: Starting docker.socket... Dec 16 13:19:32.883102 systemd[1]: Listening on sshd.socket. Dec 16 13:19:32.883754 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:19:32.884347 systemd[1]: Listening on docker.socket. Dec 16 13:19:32.884771 systemd[1]: Reached target sockets.target. Dec 16 13:19:32.885147 systemd[1]: Reached target basic.target. Dec 16 13:19:32.885501 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 16 13:19:32.885529 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 16 13:19:32.886820 systemd[1]: Starting containerd.service... Dec 16 13:19:32.888756 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 16 13:19:32.892227 systemd[1]: Starting dbus.service... Dec 16 13:19:32.895845 systemd[1]: Starting enable-oem-cloudinit.service... Dec 16 13:19:32.902357 systemd[1]: Starting extend-filesystems.service... Dec 16 13:19:32.903222 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 16 13:19:32.905622 systemd[1]: Starting kubelet.service... Dec 16 13:19:32.948698 jq[1172]: false Dec 16 13:19:32.948847 extend-filesystems[1173]: Found loop1 Dec 16 13:19:32.948847 extend-filesystems[1173]: Found vda Dec 16 13:19:32.948847 extend-filesystems[1173]: Found vda1 Dec 16 13:19:32.948847 extend-filesystems[1173]: Found vda2 Dec 16 13:19:32.948847 extend-filesystems[1173]: Found vda3 Dec 16 13:19:32.948847 extend-filesystems[1173]: Found usr Dec 16 13:19:32.948847 extend-filesystems[1173]: Found vda4 Dec 16 13:19:32.948847 extend-filesystems[1173]: Found vda6 Dec 16 13:19:32.948847 extend-filesystems[1173]: Found vda7 Dec 16 13:19:32.948847 extend-filesystems[1173]: Found vda9 Dec 16 13:19:32.948847 extend-filesystems[1173]: Checking size of /dev/vda9 Dec 16 13:19:32.911470 systemd[1]: Starting motdgen.service... Dec 16 13:19:32.916074 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 16 13:19:32.921279 systemd[1]: Starting sshd-keygen.service... Dec 16 13:19:32.929085 systemd[1]: Starting systemd-logind.service... Dec 16 13:19:32.974944 dbus-daemon[1169]: [system] SELinux support is enabled Dec 16 13:19:32.929793 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:19:32.929900 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 16 13:19:32.930714 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 16 13:19:32.993644 jq[1184]: true Dec 16 13:19:32.933195 systemd[1]: Starting update-engine.service... Dec 16 13:19:32.938506 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 16 13:19:32.942739 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 16 13:19:32.943003 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 16 13:19:32.946773 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 16 13:19:32.946980 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 16 13:19:32.975175 systemd[1]: Started dbus.service. Dec 16 13:19:32.978103 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 16 13:19:32.978172 systemd[1]: Reached target system-config.target. Dec 16 13:19:32.978609 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 16 13:19:32.978635 systemd[1]: Reached target user-config.target. Dec 16 13:19:33.005958 extend-filesystems[1173]: Resized partition /dev/vda9 Dec 16 13:19:33.024710 jq[1187]: true Dec 16 13:19:33.025232 extend-filesystems[1201]: resize2fs 1.46.5 (30-Dec-2021) Dec 16 13:19:33.033615 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Dec 16 13:19:33.062994 update_engine[1183]: I1216 13:19:33.061462 1183 main.cc:92] Flatcar Update Engine starting Dec 16 13:19:33.066743 systemd[1]: Started update-engine.service. Dec 16 13:19:33.069556 systemd[1]: Started locksmithd.service. Dec 16 13:19:33.071425 update_engine[1183]: I1216 13:19:33.071388 1183 update_check_scheduler.cc:74] Next update check in 6m49s Dec 16 13:19:33.080235 systemd[1]: motdgen.service: Deactivated successfully. Dec 16 13:19:33.080468 systemd[1]: Finished motdgen.service. Dec 16 13:19:33.110612 bash[1221]: Updated "/home/core/.ssh/authorized_keys" Dec 16 13:19:33.111312 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 16 13:19:33.122146 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Dec 16 13:19:33.153022 extend-filesystems[1201]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 16 13:19:33.153022 extend-filesystems[1201]: old_desc_blocks = 1, new_desc_blocks = 8 Dec 16 13:19:33.153022 extend-filesystems[1201]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Dec 16 13:19:33.156692 extend-filesystems[1173]: Resized filesystem in /dev/vda9 Dec 16 13:19:33.156692 extend-filesystems[1173]: Found vdb Dec 16 13:19:33.154500 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 16 13:19:33.154766 systemd[1]: Finished extend-filesystems.service. Dec 16 13:19:33.160068 systemd-logind[1181]: Watching system buttons on /dev/input/event1 (Power Button) Dec 16 13:19:33.160099 systemd-logind[1181]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 16 13:19:33.162492 systemd-logind[1181]: New seat seat0. Dec 16 13:19:33.168452 systemd[1]: Started systemd-logind.service. Dec 16 13:19:33.204873 env[1192]: time="2024-12-16T13:19:33.204783345Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 16 13:19:33.205535 coreos-metadata[1168]: Dec 16 13:19:33.205 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Dec 16 13:19:33.220501 coreos-metadata[1168]: Dec 16 13:19:33.220 INFO Fetch successful Dec 16 13:19:33.227654 unknown[1168]: wrote ssh authorized keys file for user: core Dec 16 13:19:33.244259 update-ssh-keys[1226]: Updated "/home/core/.ssh/authorized_keys" Dec 16 13:19:33.244832 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 16 13:19:33.261020 env[1192]: time="2024-12-16T13:19:33.260963368Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 16 13:19:33.262431 env[1192]: time="2024-12-16T13:19:33.262396060Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 16 13:19:33.267646 env[1192]: time="2024-12-16T13:19:33.267577705Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 16 13:19:33.269013 env[1192]: time="2024-12-16T13:19:33.268983743Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 16 13:19:33.269519 env[1192]: time="2024-12-16T13:19:33.269491015Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 16 13:19:33.271027 env[1192]: time="2024-12-16T13:19:33.270999678Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 16 13:19:33.271175 env[1192]: time="2024-12-16T13:19:33.271156346Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 16 13:19:33.271256 env[1192]: time="2024-12-16T13:19:33.271242638Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 16 13:19:33.271459 env[1192]: time="2024-12-16T13:19:33.271423131Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 16 13:19:33.272339 env[1192]: time="2024-12-16T13:19:33.272317319Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 16 13:19:33.273726 env[1192]: time="2024-12-16T13:19:33.273701014Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 16 13:19:33.273814 env[1192]: time="2024-12-16T13:19:33.273800177Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 16 13:19:33.273951 env[1192]: time="2024-12-16T13:19:33.273934600Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 16 13:19:33.275493 env[1192]: time="2024-12-16T13:19:33.275463853Z" level=info msg="metadata content store policy set" policy=shared Dec 16 13:19:33.282716 env[1192]: time="2024-12-16T13:19:33.282671072Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 16 13:19:33.282949 env[1192]: time="2024-12-16T13:19:33.282928830Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 16 13:19:33.283050 env[1192]: time="2024-12-16T13:19:33.283036389Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 16 13:19:33.283284 env[1192]: time="2024-12-16T13:19:33.283159947Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 16 13:19:33.283400 env[1192]: time="2024-12-16T13:19:33.283381681Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 16 13:19:33.283597 env[1192]: time="2024-12-16T13:19:33.283578245Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 16 13:19:33.283687 env[1192]: time="2024-12-16T13:19:33.283674886Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 16 13:19:33.283762 env[1192]: time="2024-12-16T13:19:33.283750358Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 16 13:19:33.283833 env[1192]: time="2024-12-16T13:19:33.283822215Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 16 13:19:33.283905 env[1192]: time="2024-12-16T13:19:33.283894154Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 16 13:19:33.283993 env[1192]: time="2024-12-16T13:19:33.283975250Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 16 13:19:33.284109 env[1192]: time="2024-12-16T13:19:33.284093535Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 16 13:19:33.284358 env[1192]: time="2024-12-16T13:19:33.284343001Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 16 13:19:33.284545 env[1192]: time="2024-12-16T13:19:33.284531210Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 16 13:19:33.284930 env[1192]: time="2024-12-16T13:19:33.284911568Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 16 13:19:33.285037 env[1192]: time="2024-12-16T13:19:33.285023756Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.285155 env[1192]: time="2024-12-16T13:19:33.285139605Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 16 13:19:33.285304 env[1192]: time="2024-12-16T13:19:33.285279972Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.285396 env[1192]: time="2024-12-16T13:19:33.285382200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.285477 env[1192]: time="2024-12-16T13:19:33.285465858Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.285550 env[1192]: time="2024-12-16T13:19:33.285539074Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.285621 env[1192]: time="2024-12-16T13:19:33.285610412Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.285707 env[1192]: time="2024-12-16T13:19:33.285695758Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.285782 env[1192]: time="2024-12-16T13:19:33.285770482Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.285854 env[1192]: time="2024-12-16T13:19:33.285830428Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.285938 env[1192]: time="2024-12-16T13:19:33.285926642Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 16 13:19:33.286185 env[1192]: time="2024-12-16T13:19:33.286163517Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.286320 env[1192]: time="2024-12-16T13:19:33.286303454Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.286412 env[1192]: time="2024-12-16T13:19:33.286399450Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.286491 env[1192]: time="2024-12-16T13:19:33.286479489Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 16 13:19:33.286573 env[1192]: time="2024-12-16T13:19:33.286559480Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 16 13:19:33.286644 env[1192]: time="2024-12-16T13:19:33.286629278Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 16 13:19:33.286758 env[1192]: time="2024-12-16T13:19:33.286738433Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 16 13:19:33.286881 env[1192]: time="2024-12-16T13:19:33.286866417Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 16 13:19:33.287221 env[1192]: time="2024-12-16T13:19:33.287167429Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 16 13:19:33.294461 env[1192]: time="2024-12-16T13:19:33.288594626Z" level=info msg="Connect containerd service" Dec 16 13:19:33.294461 env[1192]: time="2024-12-16T13:19:33.288668245Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 16 13:19:33.294461 env[1192]: time="2024-12-16T13:19:33.289378292Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 16 13:19:33.294461 env[1192]: time="2024-12-16T13:19:33.289715456Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 16 13:19:33.294461 env[1192]: time="2024-12-16T13:19:33.289757156Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 16 13:19:33.294461 env[1192]: time="2024-12-16T13:19:33.289824572Z" level=info msg="containerd successfully booted in 0.086437s" Dec 16 13:19:33.289962 systemd[1]: Started containerd.service. Dec 16 13:19:33.301527 env[1192]: time="2024-12-16T13:19:33.301449489Z" level=info msg="Start subscribing containerd event" Dec 16 13:19:33.301672 env[1192]: time="2024-12-16T13:19:33.301552755Z" level=info msg="Start recovering state" Dec 16 13:19:33.301672 env[1192]: time="2024-12-16T13:19:33.301635902Z" level=info msg="Start event monitor" Dec 16 13:19:33.301672 env[1192]: time="2024-12-16T13:19:33.301648474Z" level=info msg="Start snapshots syncer" Dec 16 13:19:33.301672 env[1192]: time="2024-12-16T13:19:33.301659265Z" level=info msg="Start cni network conf syncer for default" Dec 16 13:19:33.301672 env[1192]: time="2024-12-16T13:19:33.301666291Z" level=info msg="Start streaming server" Dec 16 13:19:33.524203 systemd-networkd[1008]: eth0: Gained IPv6LL Dec 16 13:19:33.572274 locksmithd[1220]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 16 13:19:34.096180 systemd[1]: Created slice system-sshd.slice. Dec 16 13:19:34.173711 systemd[1]: Started kubelet.service. Dec 16 13:19:34.565203 sshd_keygen[1198]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 16 13:19:34.602600 systemd[1]: Finished sshd-keygen.service. Dec 16 13:19:34.605208 systemd[1]: Starting issuegen.service... Dec 16 13:19:34.607318 systemd[1]: Started sshd@0-146.190.170.252:22-139.178.89.65:42976.service. Dec 16 13:19:34.621186 systemd[1]: issuegen.service: Deactivated successfully. Dec 16 13:19:34.621423 systemd[1]: Finished issuegen.service. Dec 16 13:19:34.623779 systemd[1]: Starting systemd-user-sessions.service... Dec 16 13:19:34.638697 systemd[1]: Finished systemd-user-sessions.service. Dec 16 13:19:34.641156 systemd[1]: Started getty@tty1.service. Dec 16 13:19:34.643323 systemd[1]: Started serial-getty@ttyS0.service. Dec 16 13:19:34.644081 systemd[1]: Reached target getty.target. Dec 16 13:19:34.645044 systemd[1]: Reached target multi-user.target. Dec 16 13:19:34.648175 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 16 13:19:34.669047 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 16 13:19:34.669268 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 16 13:19:34.669946 systemd[1]: Startup finished in 924ms (kernel) + 4.726s (initrd) + 7.555s (userspace) = 13.205s. Dec 16 13:19:34.749053 sshd[1250]: Accepted publickey for core from 139.178.89.65 port 42976 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:34.752928 sshd[1250]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:34.771239 systemd[1]: Created slice user-500.slice. Dec 16 13:19:34.773191 systemd[1]: Starting user-runtime-dir@500.service... Dec 16 13:19:34.788348 systemd-logind[1181]: New session 1 of user core. Dec 16 13:19:34.795664 systemd[1]: Finished user-runtime-dir@500.service. Dec 16 13:19:34.798399 systemd[1]: Starting user@500.service... Dec 16 13:19:34.806892 (systemd)[1260]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:34.917583 systemd[1260]: Queued start job for default target default.target. Dec 16 13:19:34.918906 systemd[1260]: Reached target paths.target. Dec 16 13:19:34.919171 systemd[1260]: Reached target sockets.target. Dec 16 13:19:34.919581 systemd[1260]: Reached target timers.target. Dec 16 13:19:34.919743 systemd[1260]: Reached target basic.target. Dec 16 13:19:34.919944 systemd[1260]: Reached target default.target. Dec 16 13:19:34.920068 systemd[1]: Started user@500.service. Dec 16 13:19:34.920275 systemd[1260]: Startup finished in 99ms. Dec 16 13:19:34.922006 systemd[1]: Started session-1.scope. Dec 16 13:19:34.994368 systemd[1]: Started sshd@1-146.190.170.252:22-139.178.89.65:42992.service. Dec 16 13:19:34.995395 kubelet[1236]: E1216 13:19:34.995349 1236 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 16 13:19:35.009531 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 16 13:19:35.009699 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 16 13:19:35.010040 systemd[1]: kubelet.service: Consumed 1.260s CPU time. Dec 16 13:19:35.056966 sshd[1269]: Accepted publickey for core from 139.178.89.65 port 42992 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:35.058249 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:35.065270 systemd-logind[1181]: New session 2 of user core. Dec 16 13:19:35.065875 systemd[1]: Started session-2.scope. Dec 16 13:19:35.137181 sshd[1269]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:35.143969 systemd[1]: sshd@1-146.190.170.252:22-139.178.89.65:42992.service: Deactivated successfully. Dec 16 13:19:35.144835 systemd[1]: session-2.scope: Deactivated successfully. Dec 16 13:19:35.145903 systemd-logind[1181]: Session 2 logged out. Waiting for processes to exit. Dec 16 13:19:35.147793 systemd[1]: Started sshd@2-146.190.170.252:22-139.178.89.65:42996.service. Dec 16 13:19:35.151996 systemd-logind[1181]: Removed session 2. Dec 16 13:19:35.193903 sshd[1275]: Accepted publickey for core from 139.178.89.65 port 42996 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:35.197049 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:35.203902 systemd[1]: Started session-3.scope. Dec 16 13:19:35.204454 systemd-logind[1181]: New session 3 of user core. Dec 16 13:19:35.267876 sshd[1275]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:35.273433 systemd[1]: sshd@2-146.190.170.252:22-139.178.89.65:42996.service: Deactivated successfully. Dec 16 13:19:35.274310 systemd[1]: session-3.scope: Deactivated successfully. Dec 16 13:19:35.275169 systemd-logind[1181]: Session 3 logged out. Waiting for processes to exit. Dec 16 13:19:35.277557 systemd[1]: Started sshd@3-146.190.170.252:22-139.178.89.65:43000.service. Dec 16 13:19:35.280045 systemd-logind[1181]: Removed session 3. Dec 16 13:19:35.327621 sshd[1281]: Accepted publickey for core from 139.178.89.65 port 43000 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:35.330366 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:35.336670 systemd-logind[1181]: New session 4 of user core. Dec 16 13:19:35.337431 systemd[1]: Started session-4.scope. Dec 16 13:19:35.406608 sshd[1281]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:35.414564 systemd[1]: Started sshd@4-146.190.170.252:22-139.178.89.65:43012.service. Dec 16 13:19:35.415296 systemd[1]: sshd@3-146.190.170.252:22-139.178.89.65:43000.service: Deactivated successfully. Dec 16 13:19:35.416480 systemd[1]: session-4.scope: Deactivated successfully. Dec 16 13:19:35.417206 systemd-logind[1181]: Session 4 logged out. Waiting for processes to exit. Dec 16 13:19:35.419678 systemd-logind[1181]: Removed session 4. Dec 16 13:19:35.462198 sshd[1286]: Accepted publickey for core from 139.178.89.65 port 43012 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:35.464521 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:35.471647 systemd-logind[1181]: New session 5 of user core. Dec 16 13:19:35.472508 systemd[1]: Started session-5.scope. Dec 16 13:19:35.550365 sudo[1290]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 16 13:19:35.550648 sudo[1290]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 16 13:19:35.562490 dbus-daemon[1169]: \xd0\xfd-|\u000bV: received setenforce notice (enforcing=1230773536) Dec 16 13:19:35.566683 sudo[1290]: pam_unix(sudo:session): session closed for user root Dec 16 13:19:35.572055 sshd[1286]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:35.577676 systemd[1]: sshd@4-146.190.170.252:22-139.178.89.65:43012.service: Deactivated successfully. Dec 16 13:19:35.578392 systemd[1]: session-5.scope: Deactivated successfully. Dec 16 13:19:35.578982 systemd-logind[1181]: Session 5 logged out. Waiting for processes to exit. Dec 16 13:19:35.580613 systemd[1]: Started sshd@5-146.190.170.252:22-139.178.89.65:43016.service. Dec 16 13:19:35.582060 systemd-logind[1181]: Removed session 5. Dec 16 13:19:35.625250 sshd[1294]: Accepted publickey for core from 139.178.89.65 port 43016 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:35.627909 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:35.633819 systemd[1]: Started session-6.scope. Dec 16 13:19:35.634464 systemd-logind[1181]: New session 6 of user core. Dec 16 13:19:35.696995 sudo[1298]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 16 13:19:35.697861 sudo[1298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 16 13:19:35.702839 sudo[1298]: pam_unix(sudo:session): session closed for user root Dec 16 13:19:35.710532 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 16 13:19:35.710844 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 16 13:19:35.724970 systemd[1]: Stopping audit-rules.service... Dec 16 13:19:35.725000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 16 13:19:35.725000 audit[1301]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc6d5fb910 a2=420 a3=0 items=0 ppid=1 pid=1301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:35.725000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 16 13:19:35.727201 auditctl[1301]: No rules Dec 16 13:19:35.727695 systemd[1]: audit-rules.service: Deactivated successfully. Dec 16 13:19:35.727911 systemd[1]: Stopped audit-rules.service. Dec 16 13:19:35.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:35.730478 systemd[1]: Starting audit-rules.service... Dec 16 13:19:35.756401 augenrules[1318]: No rules Dec 16 13:19:35.757778 systemd[1]: Finished audit-rules.service. Dec 16 13:19:35.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:35.759535 sudo[1297]: pam_unix(sudo:session): session closed for user root Dec 16 13:19:35.758000 audit[1297]: USER_END pid=1297 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:19:35.758000 audit[1297]: CRED_DISP pid=1297 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:19:35.763268 sshd[1294]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:35.763000 audit[1294]: USER_END pid=1294 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:35.763000 audit[1294]: CRED_DISP pid=1294 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:35.769166 systemd[1]: sshd@5-146.190.170.252:22-139.178.89.65:43016.service: Deactivated successfully. Dec 16 13:19:35.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-146.190.170.252:22-139.178.89.65:43016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:35.769979 systemd[1]: session-6.scope: Deactivated successfully. Dec 16 13:19:35.770656 systemd-logind[1181]: Session 6 logged out. Waiting for processes to exit. Dec 16 13:19:35.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.170.252:22-139.178.89.65:43022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:35.772587 systemd[1]: Started sshd@6-146.190.170.252:22-139.178.89.65:43022.service. Dec 16 13:19:35.778341 systemd-logind[1181]: Removed session 6. Dec 16 13:19:35.821000 audit[1324]: USER_ACCT pid=1324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:35.822631 sshd[1324]: Accepted publickey for core from 139.178.89.65 port 43022 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:35.822000 audit[1324]: CRED_ACQ pid=1324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:35.823000 audit[1324]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc51687ac0 a2=3 a3=0 items=0 ppid=1 pid=1324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:35.823000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:19:35.824715 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:35.830319 systemd-logind[1181]: New session 7 of user core. Dec 16 13:19:35.830888 systemd[1]: Started session-7.scope. Dec 16 13:19:35.835000 audit[1324]: USER_START pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:35.837000 audit[1326]: CRED_ACQ pid=1326 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:35.892000 audit[1327]: USER_ACCT pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:19:35.894151 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 16 13:19:35.893000 audit[1327]: CRED_REFR pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:19:35.894971 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 16 13:19:35.896000 audit[1327]: USER_START pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:19:35.914142 systemd[1]: Starting coreos-metadata.service... Dec 16 13:19:35.966195 coreos-metadata[1331]: Dec 16 13:19:35.965 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Dec 16 13:19:35.982252 coreos-metadata[1331]: Dec 16 13:19:35.981 INFO Fetch successful Dec 16 13:19:35.999982 systemd[1]: Finished coreos-metadata.service. Dec 16 13:19:36.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:36.806045 systemd[1]: Stopped kubelet.service. Dec 16 13:19:36.807029 systemd[1]: kubelet.service: Consumed 1.260s CPU time. Dec 16 13:19:36.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:36.808344 kernel: kauditd_printk_skb: 75 callbacks suppressed Dec 16 13:19:36.808431 kernel: audit: type=1130 audit(1734355176.805:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:36.814669 kernel: audit: type=1131 audit(1734355176.805:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:36.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:36.811461 systemd[1]: Starting kubelet.service... Dec 16 13:19:36.869515 systemd[1]: Reloading. Dec 16 13:19:37.048565 /usr/lib/systemd/system-generators/torcx-generator[1386]: time="2024-12-16T13:19:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 16 13:19:37.048596 /usr/lib/systemd/system-generators/torcx-generator[1386]: time="2024-12-16T13:19:37Z" level=info msg="torcx already run" Dec 16 13:19:37.142354 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 16 13:19:37.142383 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 16 13:19:37.163067 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 16 13:19:37.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.258403 kernel: audit: type=1400 audit(1734355177.248:236): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.258513 kernel: audit: type=1400 audit(1734355177.248:237): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.258534 kernel: audit: type=1400 audit(1734355177.248:238): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.258551 kernel: audit: type=1400 audit(1734355177.248:239): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.258570 kernel: audit: type=1400 audit(1734355177.248:240): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.263586 kernel: audit: type=1400 audit(1734355177.248:241): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.263679 kernel: audit: type=1400 audit(1734355177.248:242): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.268509 kernel: audit: type=1400 audit(1734355177.248:243): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.251000 audit: BPF prog-id=40 op=LOAD Dec 16 13:19:37.251000 audit: BPF prog-id=34 op=UNLOAD Dec 16 13:19:37.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.253000 audit: BPF prog-id=41 op=LOAD Dec 16 13:19:37.253000 audit: BPF prog-id=33 op=UNLOAD Dec 16 13:19:37.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.255000 audit: BPF prog-id=42 op=LOAD Dec 16 13:19:37.255000 audit: BPF prog-id=24 op=UNLOAD Dec 16 13:19:37.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.260000 audit: BPF prog-id=43 op=LOAD Dec 16 13:19:37.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.265000 audit: BPF prog-id=44 op=LOAD Dec 16 13:19:37.265000 audit: BPF prog-id=25 op=UNLOAD Dec 16 13:19:37.265000 audit: BPF prog-id=26 op=UNLOAD Dec 16 13:19:37.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.268000 audit: BPF prog-id=45 op=LOAD Dec 16 13:19:37.268000 audit: BPF prog-id=27 op=UNLOAD Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit: BPF prog-id=46 op=LOAD Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit: BPF prog-id=47 op=LOAD Dec 16 13:19:37.269000 audit: BPF prog-id=28 op=UNLOAD Dec 16 13:19:37.269000 audit: BPF prog-id=29 op=UNLOAD Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.270000 audit: BPF prog-id=48 op=LOAD Dec 16 13:19:37.270000 audit: BPF prog-id=30 op=UNLOAD Dec 16 13:19:37.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.271000 audit: BPF prog-id=49 op=LOAD Dec 16 13:19:37.271000 audit: BPF prog-id=38 op=UNLOAD Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit: BPF prog-id=50 op=LOAD Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.273000 audit: BPF prog-id=51 op=LOAD Dec 16 13:19:37.273000 audit: BPF prog-id=31 op=UNLOAD Dec 16 13:19:37.273000 audit: BPF prog-id=32 op=UNLOAD Dec 16 13:19:37.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit: BPF prog-id=52 op=LOAD Dec 16 13:19:37.278000 audit: BPF prog-id=35 op=UNLOAD Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit: BPF prog-id=53 op=LOAD Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:37.278000 audit: BPF prog-id=54 op=LOAD Dec 16 13:19:37.278000 audit: BPF prog-id=36 op=UNLOAD Dec 16 13:19:37.278000 audit: BPF prog-id=37 op=UNLOAD Dec 16 13:19:37.305617 systemd[1]: Started kubelet.service. Dec 16 13:19:37.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:37.309968 systemd[1]: Stopping kubelet.service... Dec 16 13:19:37.311602 systemd[1]: kubelet.service: Deactivated successfully. Dec 16 13:19:37.312092 systemd[1]: Stopped kubelet.service. Dec 16 13:19:37.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:37.316185 systemd[1]: Starting kubelet.service... Dec 16 13:19:37.429055 systemd[1]: Started kubelet.service. Dec 16 13:19:37.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:37.498762 kubelet[1438]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 16 13:19:37.499198 kubelet[1438]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 16 13:19:37.499258 kubelet[1438]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 16 13:19:37.499447 kubelet[1438]: I1216 13:19:37.499385 1438 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 16 13:19:37.930714 kubelet[1438]: I1216 13:19:37.930670 1438 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 16 13:19:37.930887 kubelet[1438]: I1216 13:19:37.930875 1438 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 16 13:19:37.931259 kubelet[1438]: I1216 13:19:37.931243 1438 server.go:929] "Client rotation is on, will bootstrap in background" Dec 16 13:19:37.959918 kubelet[1438]: I1216 13:19:37.959851 1438 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 16 13:19:37.976731 kubelet[1438]: E1216 13:19:37.976645 1438 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 16 13:19:37.976731 kubelet[1438]: I1216 13:19:37.976726 1438 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 16 13:19:37.984452 kubelet[1438]: I1216 13:19:37.984402 1438 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 16 13:19:37.985917 kubelet[1438]: I1216 13:19:37.985863 1438 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 16 13:19:37.986206 kubelet[1438]: I1216 13:19:37.986149 1438 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 16 13:19:37.986436 kubelet[1438]: I1216 13:19:37.986209 1438 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"146.190.170.252","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 16 13:19:37.986598 kubelet[1438]: I1216 13:19:37.986440 1438 topology_manager.go:138] "Creating topology manager with none policy" Dec 16 13:19:37.986598 kubelet[1438]: I1216 13:19:37.986450 1438 container_manager_linux.go:300] "Creating device plugin manager" Dec 16 13:19:37.986670 kubelet[1438]: I1216 13:19:37.986619 1438 state_mem.go:36] "Initialized new in-memory state store" Dec 16 13:19:37.992447 kubelet[1438]: I1216 13:19:37.992375 1438 kubelet.go:408] "Attempting to sync node with API server" Dec 16 13:19:37.992708 kubelet[1438]: I1216 13:19:37.992474 1438 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 16 13:19:37.992708 kubelet[1438]: I1216 13:19:37.992551 1438 kubelet.go:314] "Adding apiserver pod source" Dec 16 13:19:37.992708 kubelet[1438]: I1216 13:19:37.992571 1438 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 16 13:19:37.996431 kubelet[1438]: E1216 13:19:37.996388 1438 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:37.996728 kubelet[1438]: E1216 13:19:37.996709 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:37.999623 kubelet[1438]: I1216 13:19:37.999559 1438 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 16 13:19:38.001912 kubelet[1438]: I1216 13:19:38.001855 1438 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 16 13:19:38.002653 kubelet[1438]: W1216 13:19:38.002602 1438 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 16 13:19:38.003726 kubelet[1438]: I1216 13:19:38.003688 1438 server.go:1269] "Started kubelet" Dec 16 13:19:38.004532 kubelet[1438]: W1216 13:19:38.004495 1438 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "146.190.170.252" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 16 13:19:38.004812 kubelet[1438]: E1216 13:19:38.004780 1438 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"146.190.170.252\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 16 13:19:38.005143 kubelet[1438]: W1216 13:19:38.005097 1438 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 16 13:19:38.005329 kubelet[1438]: E1216 13:19:38.005283 1438 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 16 13:19:38.005742 kubelet[1438]: I1216 13:19:38.005700 1438 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 16 13:19:38.007000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:38.007000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 16 13:19:38.007000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a7cf30 a1=c000a3cd08 a2=c000a7cf00 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.007000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 16 13:19:38.009553 kubelet[1438]: I1216 13:19:38.009511 1438 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 16 13:19:38.008000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:38.008000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 16 13:19:38.009831 kubelet[1438]: I1216 13:19:38.009698 1438 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 16 13:19:38.008000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00037df80 a1=c000a3cd20 a2=c000a7cfc0 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.008000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 16 13:19:38.010275 kubelet[1438]: I1216 13:19:38.010252 1438 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 16 13:19:38.010373 kubelet[1438]: I1216 13:19:38.010264 1438 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 16 13:19:38.011333 kubelet[1438]: I1216 13:19:38.011305 1438 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 16 13:19:38.015195 kubelet[1438]: I1216 13:19:38.015155 1438 server.go:460] "Adding debug handlers to kubelet server" Dec 16 13:19:38.016374 kubelet[1438]: I1216 13:19:38.016337 1438 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 16 13:19:38.021406 kubelet[1438]: I1216 13:19:38.021364 1438 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 16 13:19:38.022015 kubelet[1438]: E1216 13:19:38.021979 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:38.023620 kubelet[1438]: I1216 13:19:38.022398 1438 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 16 13:19:38.023620 kubelet[1438]: I1216 13:19:38.022478 1438 reconciler.go:26] "Reconciler: start to sync state" Dec 16 13:19:38.028804 kubelet[1438]: E1216 13:19:38.021960 1438 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{146.190.170.252.1811aad86b445210 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:146.190.170.252,UID:146.190.170.252,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:146.190.170.252,},FirstTimestamp:2024-12-16 13:19:38.00364904 +0000 UTC m=+0.564682127,LastTimestamp:2024-12-16 13:19:38.00364904 +0000 UTC m=+0.564682127,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:146.190.170.252,}" Dec 16 13:19:38.028804 kubelet[1438]: E1216 13:19:38.028317 1438 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"146.190.170.252\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 16 13:19:38.028804 kubelet[1438]: W1216 13:19:38.028411 1438 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 16 13:19:38.028804 kubelet[1438]: E1216 13:19:38.028451 1438 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Dec 16 13:19:38.028804 kubelet[1438]: E1216 13:19:38.028724 1438 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 16 13:19:38.029518 kubelet[1438]: I1216 13:19:38.029148 1438 factory.go:221] Registration of the containerd container factory successfully Dec 16 13:19:38.029518 kubelet[1438]: I1216 13:19:38.029163 1438 factory.go:221] Registration of the systemd container factory successfully Dec 16 13:19:38.029518 kubelet[1438]: I1216 13:19:38.029284 1438 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 16 13:19:38.067996 kubelet[1438]: I1216 13:19:38.067945 1438 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 16 13:19:38.068442 kubelet[1438]: I1216 13:19:38.068416 1438 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 16 13:19:38.068646 kubelet[1438]: I1216 13:19:38.068629 1438 state_mem.go:36] "Initialized new in-memory state store" Dec 16 13:19:38.074674 kubelet[1438]: I1216 13:19:38.074614 1438 policy_none.go:49] "None policy: Start" Dec 16 13:19:38.076770 kubelet[1438]: I1216 13:19:38.076721 1438 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 16 13:19:38.077078 kubelet[1438]: I1216 13:19:38.077047 1438 state_mem.go:35] "Initializing new in-memory state store" Dec 16 13:19:38.083000 audit[1451]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:38.083000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd54ab4ca0 a2=0 a3=7ffd54ab4c8c items=0 ppid=1438 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 16 13:19:38.086000 audit[1457]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:38.086000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc816a4560 a2=0 a3=7ffc816a454c items=0 ppid=1438 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.086000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 16 13:19:38.092599 systemd[1]: Created slice kubepods.slice. Dec 16 13:19:38.100554 systemd[1]: Created slice kubepods-burstable.slice. Dec 16 13:19:38.105767 systemd[1]: Created slice kubepods-besteffort.slice. Dec 16 13:19:38.116002 kubelet[1438]: I1216 13:19:38.115953 1438 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 16 13:19:38.116256 kubelet[1438]: I1216 13:19:38.116039 1438 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 16 13:19:38.116256 kubelet[1438]: I1216 13:19:38.116214 1438 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 16 13:19:38.116256 kubelet[1438]: I1216 13:19:38.116225 1438 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 16 13:19:38.114000 audit[1438]: AVC avc: denied { mac_admin } for pid=1438 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:38.114000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 16 13:19:38.114000 audit[1438]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e02180 a1=c000def3c8 a2=c000e02150 a3=25 items=0 ppid=1 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.114000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 16 13:19:38.119341 kubelet[1438]: I1216 13:19:38.117314 1438 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 16 13:19:38.123905 kubelet[1438]: E1216 13:19:38.123312 1438 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"146.190.170.252\" not found" Dec 16 13:19:38.106000 audit[1459]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:38.106000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff37504f60 a2=0 a3=7fff37504f4c items=0 ppid=1438 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 16 13:19:38.138000 audit[1464]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:38.138000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe0bb4dc40 a2=0 a3=7ffe0bb4dc2c items=0 ppid=1438 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 16 13:19:38.206000 audit[1469]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:38.206000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdc6c22300 a2=0 a3=7ffdc6c222ec items=0 ppid=1438 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 16 13:19:38.210421 kubelet[1438]: I1216 13:19:38.209267 1438 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 16 13:19:38.210000 audit[1470]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:38.210000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb07935f0 a2=0 a3=7ffeb07935dc items=0 ppid=1438 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 16 13:19:38.212185 kubelet[1438]: I1216 13:19:38.211868 1438 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 16 13:19:38.212185 kubelet[1438]: I1216 13:19:38.211913 1438 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 16 13:19:38.212185 kubelet[1438]: I1216 13:19:38.211940 1438 kubelet.go:2321] "Starting kubelet main sync loop" Dec 16 13:19:38.212185 kubelet[1438]: E1216 13:19:38.212106 1438 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 16 13:19:38.213000 audit[1471]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:38.213000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce60abbe0 a2=0 a3=7ffce60abbcc items=0 ppid=1438 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 16 13:19:38.214000 audit[1472]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:38.214000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe40eb58f0 a2=0 a3=7ffe40eb58dc items=0 ppid=1438 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 16 13:19:38.215000 audit[1473]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:38.215000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc323e6eb0 a2=0 a3=7ffc323e6e9c items=0 ppid=1438 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 16 13:19:38.217360 kubelet[1438]: I1216 13:19:38.217299 1438 kubelet_node_status.go:72] "Attempting to register node" node="146.190.170.252" Dec 16 13:19:38.217000 audit[1474]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:38.217000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe392a0cb0 a2=0 a3=7ffe392a0c9c items=0 ppid=1438 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 16 13:19:38.219000 audit[1476]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:38.219000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffeec0ac20 a2=0 a3=7fffeec0ac0c items=0 ppid=1438 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 16 13:19:38.220000 audit[1475]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:38.220000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb6f73280 a2=0 a3=7fffb6f7326c items=0 ppid=1438 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 16 13:19:38.230260 kubelet[1438]: I1216 13:19:38.230205 1438 kubelet_node_status.go:75] "Successfully registered node" node="146.190.170.252" Dec 16 13:19:38.230260 kubelet[1438]: E1216 13:19:38.230247 1438 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"146.190.170.252\": node \"146.190.170.252\" not found" Dec 16 13:19:38.273841 kubelet[1438]: E1216 13:19:38.273765 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:38.375013 kubelet[1438]: E1216 13:19:38.374876 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:38.475983 kubelet[1438]: E1216 13:19:38.475772 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:38.478869 sudo[1327]: pam_unix(sudo:session): session closed for user root Dec 16 13:19:38.477000 audit[1327]: USER_END pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:19:38.477000 audit[1327]: CRED_DISP pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:19:38.483525 sshd[1324]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:38.483000 audit[1324]: USER_END pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:38.484000 audit[1324]: CRED_DISP pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:38.489396 systemd[1]: sshd@6-146.190.170.252:22-139.178.89.65:43022.service: Deactivated successfully. Dec 16 13:19:38.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.170.252:22-139.178.89.65:43022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:38.490376 systemd[1]: session-7.scope: Deactivated successfully. Dec 16 13:19:38.491306 systemd-logind[1181]: Session 7 logged out. Waiting for processes to exit. Dec 16 13:19:38.492568 systemd-logind[1181]: Removed session 7. Dec 16 13:19:38.576782 kubelet[1438]: E1216 13:19:38.576723 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:38.677938 kubelet[1438]: E1216 13:19:38.677889 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:38.779233 kubelet[1438]: E1216 13:19:38.778963 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:38.880271 kubelet[1438]: E1216 13:19:38.880203 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:38.933083 kubelet[1438]: I1216 13:19:38.933022 1438 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 16 13:19:38.933601 kubelet[1438]: W1216 13:19:38.933577 1438 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 16 13:19:38.981430 kubelet[1438]: E1216 13:19:38.981362 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:38.997849 kubelet[1438]: E1216 13:19:38.997785 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:39.082317 kubelet[1438]: E1216 13:19:39.081938 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:39.182971 kubelet[1438]: E1216 13:19:39.182913 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:39.283817 kubelet[1438]: E1216 13:19:39.283733 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:39.384924 kubelet[1438]: E1216 13:19:39.384574 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:39.485694 kubelet[1438]: E1216 13:19:39.485634 1438 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"146.190.170.252\" not found" Dec 16 13:19:39.587319 kubelet[1438]: I1216 13:19:39.587270 1438 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 16 13:19:39.587904 env[1192]: time="2024-12-16T13:19:39.587796424Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 16 13:19:39.588210 kubelet[1438]: I1216 13:19:39.588076 1438 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 16 13:19:39.996989 kubelet[1438]: I1216 13:19:39.996904 1438 apiserver.go:52] "Watching apiserver" Dec 16 13:19:39.998142 kubelet[1438]: E1216 13:19:39.998077 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:40.004309 kubelet[1438]: E1216 13:19:40.003962 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw68p" podUID="0d56ae2d-4bfb-4820-982c-56c604fe9994" Dec 16 13:19:40.008201 systemd[1]: Created slice kubepods-besteffort-pod2a3d52e4_bc7a_499b_9b7b_18e43c193e3a.slice. Dec 16 13:19:40.009721 kubelet[1438]: W1216 13:19:40.009682 1438 helpers.go:245] readString: Failed to read "/sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/kubepods-besteffort-pod2a3d52e4_bc7a_499b_9b7b_18e43c193e3a.slice/cpuset.cpus.effective": read /sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/kubepods-besteffort-pod2a3d52e4_bc7a_499b_9b7b_18e43c193e3a.slice/cpuset.cpus.effective: no such device Dec 16 13:19:40.018046 systemd[1]: Created slice kubepods-besteffort-pod2fa84e98_ef27_49d5_857e_e5a714e0c313.slice. Dec 16 13:19:40.025204 kubelet[1438]: I1216 13:19:40.025177 1438 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 16 13:19:40.036774 kubelet[1438]: I1216 13:19:40.036736 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2fa84e98-ef27-49d5-857e-e5a714e0c313-tigera-ca-bundle\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.036992 kubelet[1438]: I1216 13:19:40.036970 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0d56ae2d-4bfb-4820-982c-56c604fe9994-kubelet-dir\") pod \"csi-node-driver-bw68p\" (UID: \"0d56ae2d-4bfb-4820-982c-56c604fe9994\") " pod="calico-system/csi-node-driver-bw68p" Dec 16 13:19:40.037100 kubelet[1438]: I1216 13:19:40.037087 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0d56ae2d-4bfb-4820-982c-56c604fe9994-socket-dir\") pod \"csi-node-driver-bw68p\" (UID: \"0d56ae2d-4bfb-4820-982c-56c604fe9994\") " pod="calico-system/csi-node-driver-bw68p" Dec 16 13:19:40.037208 kubelet[1438]: I1216 13:19:40.037195 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2a3d52e4-bc7a-499b-9b7b-18e43c193e3a-kube-proxy\") pod \"kube-proxy-hxkl5\" (UID: \"2a3d52e4-bc7a-499b-9b7b-18e43c193e3a\") " pod="kube-system/kube-proxy-hxkl5" Dec 16 13:19:40.037401 kubelet[1438]: I1216 13:19:40.037387 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2a3d52e4-bc7a-499b-9b7b-18e43c193e3a-xtables-lock\") pod \"kube-proxy-hxkl5\" (UID: \"2a3d52e4-bc7a-499b-9b7b-18e43c193e3a\") " pod="kube-system/kube-proxy-hxkl5" Dec 16 13:19:40.037526 kubelet[1438]: I1216 13:19:40.037512 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lp6nc\" (UniqueName: \"kubernetes.io/projected/2a3d52e4-bc7a-499b-9b7b-18e43c193e3a-kube-api-access-lp6nc\") pod \"kube-proxy-hxkl5\" (UID: \"2a3d52e4-bc7a-499b-9b7b-18e43c193e3a\") " pod="kube-system/kube-proxy-hxkl5" Dec 16 13:19:40.037620 kubelet[1438]: I1216 13:19:40.037609 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2fa84e98-ef27-49d5-857e-e5a714e0c313-xtables-lock\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.037711 kubelet[1438]: I1216 13:19:40.037700 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2fa84e98-ef27-49d5-857e-e5a714e0c313-policysync\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.037823 kubelet[1438]: I1216 13:19:40.037811 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2fa84e98-ef27-49d5-857e-e5a714e0c313-flexvol-driver-host\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.037920 kubelet[1438]: I1216 13:19:40.037907 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2fa84e98-ef27-49d5-857e-e5a714e0c313-lib-modules\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.038006 kubelet[1438]: I1216 13:19:40.037995 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2fa84e98-ef27-49d5-857e-e5a714e0c313-node-certs\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.038169 kubelet[1438]: I1216 13:19:40.038131 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2fa84e98-ef27-49d5-857e-e5a714e0c313-cni-bin-dir\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.038309 kubelet[1438]: I1216 13:19:40.038287 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2fa84e98-ef27-49d5-857e-e5a714e0c313-cni-net-dir\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.038420 kubelet[1438]: I1216 13:19:40.038408 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2fa84e98-ef27-49d5-857e-e5a714e0c313-cni-log-dir\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.038577 kubelet[1438]: I1216 13:19:40.038534 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tlqd2\" (UniqueName: \"kubernetes.io/projected/0d56ae2d-4bfb-4820-982c-56c604fe9994-kube-api-access-tlqd2\") pod \"csi-node-driver-bw68p\" (UID: \"0d56ae2d-4bfb-4820-982c-56c604fe9994\") " pod="calico-system/csi-node-driver-bw68p" Dec 16 13:19:40.038846 kubelet[1438]: I1216 13:19:40.038816 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2fa84e98-ef27-49d5-857e-e5a714e0c313-var-lib-calico\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.039183 kubelet[1438]: I1216 13:19:40.039136 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0d56ae2d-4bfb-4820-982c-56c604fe9994-varrun\") pod \"csi-node-driver-bw68p\" (UID: \"0d56ae2d-4bfb-4820-982c-56c604fe9994\") " pod="calico-system/csi-node-driver-bw68p" Dec 16 13:19:40.039330 kubelet[1438]: I1216 13:19:40.039314 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0d56ae2d-4bfb-4820-982c-56c604fe9994-registration-dir\") pod \"csi-node-driver-bw68p\" (UID: \"0d56ae2d-4bfb-4820-982c-56c604fe9994\") " pod="calico-system/csi-node-driver-bw68p" Dec 16 13:19:40.039560 kubelet[1438]: I1216 13:19:40.039544 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2a3d52e4-bc7a-499b-9b7b-18e43c193e3a-lib-modules\") pod \"kube-proxy-hxkl5\" (UID: \"2a3d52e4-bc7a-499b-9b7b-18e43c193e3a\") " pod="kube-system/kube-proxy-hxkl5" Dec 16 13:19:40.039675 kubelet[1438]: I1216 13:19:40.039651 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2fa84e98-ef27-49d5-857e-e5a714e0c313-var-run-calico\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.039763 kubelet[1438]: I1216 13:19:40.039751 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mkzb8\" (UniqueName: \"kubernetes.io/projected/2fa84e98-ef27-49d5-857e-e5a714e0c313-kube-api-access-mkzb8\") pod \"calico-node-62kq2\" (UID: \"2fa84e98-ef27-49d5-857e-e5a714e0c313\") " pod="calico-system/calico-node-62kq2" Dec 16 13:19:40.142005 kubelet[1438]: I1216 13:19:40.141960 1438 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 16 13:19:40.142360 kubelet[1438]: E1216 13:19:40.142056 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.142450 kubelet[1438]: W1216 13:19:40.142363 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.142450 kubelet[1438]: E1216 13:19:40.142391 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.142666 kubelet[1438]: E1216 13:19:40.142650 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.142666 kubelet[1438]: W1216 13:19:40.142666 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.142757 kubelet[1438]: E1216 13:19:40.142681 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.142883 kubelet[1438]: E1216 13:19:40.142867 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.142883 kubelet[1438]: W1216 13:19:40.142879 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.142977 kubelet[1438]: E1216 13:19:40.142890 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.143205 kubelet[1438]: E1216 13:19:40.143185 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.143205 kubelet[1438]: W1216 13:19:40.143200 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.143324 kubelet[1438]: E1216 13:19:40.143217 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.143651 kubelet[1438]: E1216 13:19:40.143631 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.143714 kubelet[1438]: W1216 13:19:40.143652 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.143714 kubelet[1438]: E1216 13:19:40.143667 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.143857 kubelet[1438]: E1216 13:19:40.143844 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.143857 kubelet[1438]: W1216 13:19:40.143855 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.143932 kubelet[1438]: E1216 13:19:40.143878 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.144102 kubelet[1438]: E1216 13:19:40.144082 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.144102 kubelet[1438]: W1216 13:19:40.144095 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.144288 kubelet[1438]: E1216 13:19:40.144106 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.144384 kubelet[1438]: E1216 13:19:40.144370 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.144384 kubelet[1438]: W1216 13:19:40.144381 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.144474 kubelet[1438]: E1216 13:19:40.144456 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.144592 kubelet[1438]: E1216 13:19:40.144579 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.144646 kubelet[1438]: W1216 13:19:40.144588 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.144705 kubelet[1438]: E1216 13:19:40.144688 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.144878 kubelet[1438]: E1216 13:19:40.144859 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.144878 kubelet[1438]: W1216 13:19:40.144875 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.144990 kubelet[1438]: E1216 13:19:40.144978 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.145109 kubelet[1438]: E1216 13:19:40.145090 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.145109 kubelet[1438]: W1216 13:19:40.145100 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.145199 kubelet[1438]: E1216 13:19:40.145144 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.145317 kubelet[1438]: E1216 13:19:40.145300 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.145317 kubelet[1438]: W1216 13:19:40.145311 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.145397 kubelet[1438]: E1216 13:19:40.145382 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.145554 kubelet[1438]: E1216 13:19:40.145537 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.145605 kubelet[1438]: W1216 13:19:40.145557 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.145688 kubelet[1438]: E1216 13:19:40.145666 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.145846 kubelet[1438]: E1216 13:19:40.145829 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.145897 kubelet[1438]: W1216 13:19:40.145845 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.145980 kubelet[1438]: E1216 13:19:40.145958 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.146165 kubelet[1438]: E1216 13:19:40.146139 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.146165 kubelet[1438]: W1216 13:19:40.146153 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.146263 kubelet[1438]: E1216 13:19:40.146226 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.146362 kubelet[1438]: E1216 13:19:40.146345 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.146362 kubelet[1438]: W1216 13:19:40.146359 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.146491 kubelet[1438]: E1216 13:19:40.146464 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.146663 kubelet[1438]: E1216 13:19:40.146645 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.146663 kubelet[1438]: W1216 13:19:40.146658 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.146770 kubelet[1438]: E1216 13:19:40.146738 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.146900 kubelet[1438]: E1216 13:19:40.146884 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.146900 kubelet[1438]: W1216 13:19:40.146898 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.147038 kubelet[1438]: E1216 13:19:40.147016 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.147216 kubelet[1438]: E1216 13:19:40.147196 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.147291 kubelet[1438]: W1216 13:19:40.147217 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.147349 kubelet[1438]: E1216 13:19:40.147331 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.147531 kubelet[1438]: E1216 13:19:40.147513 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.147531 kubelet[1438]: W1216 13:19:40.147530 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.147664 kubelet[1438]: E1216 13:19:40.147645 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.147832 kubelet[1438]: E1216 13:19:40.147814 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.147832 kubelet[1438]: W1216 13:19:40.147831 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.147962 kubelet[1438]: E1216 13:19:40.147940 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.148168 kubelet[1438]: E1216 13:19:40.148149 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.148168 kubelet[1438]: W1216 13:19:40.148162 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.148294 kubelet[1438]: E1216 13:19:40.148238 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.148361 kubelet[1438]: E1216 13:19:40.148348 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.148361 kubelet[1438]: W1216 13:19:40.148360 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.148454 kubelet[1438]: E1216 13:19:40.148438 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.148584 kubelet[1438]: E1216 13:19:40.148571 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.148638 kubelet[1438]: W1216 13:19:40.148585 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.148688 kubelet[1438]: E1216 13:19:40.148656 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.148764 kubelet[1438]: E1216 13:19:40.148751 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.148764 kubelet[1438]: W1216 13:19:40.148761 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.148842 kubelet[1438]: E1216 13:19:40.148822 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.148927 kubelet[1438]: E1216 13:19:40.148914 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.148927 kubelet[1438]: W1216 13:19:40.148923 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.149023 kubelet[1438]: E1216 13:19:40.148981 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.149105 kubelet[1438]: E1216 13:19:40.149090 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.149105 kubelet[1438]: W1216 13:19:40.149103 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.149327 kubelet[1438]: E1216 13:19:40.149300 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.149431 kubelet[1438]: E1216 13:19:40.149416 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.149431 kubelet[1438]: W1216 13:19:40.149427 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.149513 kubelet[1438]: E1216 13:19:40.149495 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.149605 kubelet[1438]: E1216 13:19:40.149590 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.149605 kubelet[1438]: W1216 13:19:40.149601 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.149690 kubelet[1438]: E1216 13:19:40.149665 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.149814 kubelet[1438]: E1216 13:19:40.149796 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.149814 kubelet[1438]: W1216 13:19:40.149809 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.149926 kubelet[1438]: E1216 13:19:40.149907 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.150095 kubelet[1438]: E1216 13:19:40.150076 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.150095 kubelet[1438]: W1216 13:19:40.150091 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.150225 kubelet[1438]: E1216 13:19:40.150162 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.150320 kubelet[1438]: E1216 13:19:40.150304 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.150320 kubelet[1438]: W1216 13:19:40.150315 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.150417 kubelet[1438]: E1216 13:19:40.150380 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.150486 kubelet[1438]: E1216 13:19:40.150472 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.150486 kubelet[1438]: W1216 13:19:40.150482 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.150589 kubelet[1438]: E1216 13:19:40.150542 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.150650 kubelet[1438]: E1216 13:19:40.150635 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.150650 kubelet[1438]: W1216 13:19:40.150645 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.150735 kubelet[1438]: E1216 13:19:40.150707 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.150814 kubelet[1438]: E1216 13:19:40.150798 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.150814 kubelet[1438]: W1216 13:19:40.150808 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.150894 kubelet[1438]: E1216 13:19:40.150870 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.150990 kubelet[1438]: E1216 13:19:40.150966 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.150990 kubelet[1438]: W1216 13:19:40.150978 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.151098 kubelet[1438]: E1216 13:19:40.151053 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.151288 kubelet[1438]: E1216 13:19:40.151271 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.151288 kubelet[1438]: W1216 13:19:40.151283 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.151415 kubelet[1438]: E1216 13:19:40.151384 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.151541 kubelet[1438]: E1216 13:19:40.151524 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.151541 kubelet[1438]: W1216 13:19:40.151537 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.151624 kubelet[1438]: E1216 13:19:40.151610 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.151716 kubelet[1438]: E1216 13:19:40.151704 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.151716 kubelet[1438]: W1216 13:19:40.151713 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.151821 kubelet[1438]: E1216 13:19:40.151774 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.151880 kubelet[1438]: E1216 13:19:40.151868 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.151880 kubelet[1438]: W1216 13:19:40.151877 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.151962 kubelet[1438]: E1216 13:19:40.151938 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.152091 kubelet[1438]: E1216 13:19:40.152077 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.152091 kubelet[1438]: W1216 13:19:40.152089 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.152250 kubelet[1438]: E1216 13:19:40.152173 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.152302 kubelet[1438]: E1216 13:19:40.152289 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.152302 kubelet[1438]: W1216 13:19:40.152298 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.152385 kubelet[1438]: E1216 13:19:40.152360 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.152481 kubelet[1438]: E1216 13:19:40.152466 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.152481 kubelet[1438]: W1216 13:19:40.152476 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.152556 kubelet[1438]: E1216 13:19:40.152536 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.152687 kubelet[1438]: E1216 13:19:40.152668 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.152687 kubelet[1438]: W1216 13:19:40.152685 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.152775 kubelet[1438]: E1216 13:19:40.152761 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.153077 kubelet[1438]: E1216 13:19:40.153059 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.153077 kubelet[1438]: W1216 13:19:40.153077 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.153171 kubelet[1438]: E1216 13:19:40.153146 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.153358 kubelet[1438]: E1216 13:19:40.153308 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.153358 kubelet[1438]: W1216 13:19:40.153320 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.153454 kubelet[1438]: E1216 13:19:40.153396 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.153523 kubelet[1438]: E1216 13:19:40.153511 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.153523 kubelet[1438]: W1216 13:19:40.153521 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.153593 kubelet[1438]: E1216 13:19:40.153582 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.153694 kubelet[1438]: E1216 13:19:40.153679 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.153694 kubelet[1438]: W1216 13:19:40.153689 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.153769 kubelet[1438]: E1216 13:19:40.153758 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.153913 kubelet[1438]: E1216 13:19:40.153897 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.153913 kubelet[1438]: W1216 13:19:40.153909 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.153999 kubelet[1438]: E1216 13:19:40.153987 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.154460 kubelet[1438]: E1216 13:19:40.154330 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.154460 kubelet[1438]: W1216 13:19:40.154348 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.154773 kubelet[1438]: E1216 13:19:40.154747 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.154999 kubelet[1438]: E1216 13:19:40.154980 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.154999 kubelet[1438]: W1216 13:19:40.154994 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.155124 kubelet[1438]: E1216 13:19:40.155078 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.155283 kubelet[1438]: E1216 13:19:40.155265 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.155283 kubelet[1438]: W1216 13:19:40.155279 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.155406 kubelet[1438]: E1216 13:19:40.155383 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.155715 kubelet[1438]: E1216 13:19:40.155696 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.155715 kubelet[1438]: W1216 13:19:40.155711 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.155846 kubelet[1438]: E1216 13:19:40.155785 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.155930 kubelet[1438]: E1216 13:19:40.155917 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.155930 kubelet[1438]: W1216 13:19:40.155928 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.156007 kubelet[1438]: E1216 13:19:40.155996 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.156192 kubelet[1438]: E1216 13:19:40.156177 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.156192 kubelet[1438]: W1216 13:19:40.156188 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.156276 kubelet[1438]: E1216 13:19:40.156253 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.156376 kubelet[1438]: E1216 13:19:40.156361 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.156376 kubelet[1438]: W1216 13:19:40.156371 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.156478 kubelet[1438]: E1216 13:19:40.156465 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.161296 kubelet[1438]: E1216 13:19:40.161255 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.161538 kubelet[1438]: W1216 13:19:40.161514 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.162003 kubelet[1438]: E1216 13:19:40.161978 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.162209 kubelet[1438]: W1216 13:19:40.162190 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.162466 kubelet[1438]: E1216 13:19:40.162019 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.162633 kubelet[1438]: E1216 13:19:40.162617 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.162745 kubelet[1438]: E1216 13:19:40.162735 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.162809 kubelet[1438]: W1216 13:19:40.162797 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.162921 kubelet[1438]: E1216 13:19:40.162896 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.163294 kubelet[1438]: E1216 13:19:40.163276 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.163572 kubelet[1438]: W1216 13:19:40.163547 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.163800 kubelet[1438]: E1216 13:19:40.163786 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.163967 kubelet[1438]: E1216 13:19:40.163957 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.164034 kubelet[1438]: W1216 13:19:40.164023 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.164163 kubelet[1438]: E1216 13:19:40.164141 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.164451 kubelet[1438]: E1216 13:19:40.164438 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.164580 kubelet[1438]: W1216 13:19:40.164566 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.164735 kubelet[1438]: E1216 13:19:40.164715 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.164923 kubelet[1438]: E1216 13:19:40.164912 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.164988 kubelet[1438]: W1216 13:19:40.164977 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.165076 kubelet[1438]: E1216 13:19:40.165057 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.165514 kubelet[1438]: E1216 13:19:40.165500 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.165595 kubelet[1438]: W1216 13:19:40.165582 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.165704 kubelet[1438]: E1216 13:19:40.165687 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.166009 kubelet[1438]: E1216 13:19:40.165990 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.166103 kubelet[1438]: W1216 13:19:40.166084 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.166297 kubelet[1438]: E1216 13:19:40.166270 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.166491 kubelet[1438]: E1216 13:19:40.166479 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.166572 kubelet[1438]: W1216 13:19:40.166560 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.166761 kubelet[1438]: E1216 13:19:40.166741 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.167772 kubelet[1438]: E1216 13:19:40.167743 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.167883 kubelet[1438]: W1216 13:19:40.167867 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.168029 kubelet[1438]: E1216 13:19:40.168003 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.168379 kubelet[1438]: E1216 13:19:40.168358 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.168474 kubelet[1438]: W1216 13:19:40.168459 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.168624 kubelet[1438]: E1216 13:19:40.168597 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.168903 kubelet[1438]: E1216 13:19:40.168887 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.168993 kubelet[1438]: W1216 13:19:40.168978 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.169180 kubelet[1438]: E1216 13:19:40.169105 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.169588 kubelet[1438]: E1216 13:19:40.169568 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.169703 kubelet[1438]: W1216 13:19:40.169686 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.169902 kubelet[1438]: E1216 13:19:40.169889 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.170126 kubelet[1438]: E1216 13:19:40.170102 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.170175 kubelet[1438]: W1216 13:19:40.170160 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.170323 kubelet[1438]: E1216 13:19:40.170305 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.170479 kubelet[1438]: E1216 13:19:40.170465 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.170479 kubelet[1438]: W1216 13:19:40.170478 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.170593 kubelet[1438]: E1216 13:19:40.170573 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.170709 kubelet[1438]: E1216 13:19:40.170696 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.170757 kubelet[1438]: W1216 13:19:40.170708 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.170818 kubelet[1438]: E1216 13:19:40.170800 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.170984 kubelet[1438]: E1216 13:19:40.170969 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.171028 kubelet[1438]: W1216 13:19:40.170985 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.171103 kubelet[1438]: E1216 13:19:40.171087 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.171323 kubelet[1438]: E1216 13:19:40.171303 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.171374 kubelet[1438]: W1216 13:19:40.171322 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.171374 kubelet[1438]: E1216 13:19:40.171338 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.191481 kubelet[1438]: E1216 13:19:40.191434 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.191711 kubelet[1438]: W1216 13:19:40.191686 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.191827 kubelet[1438]: E1216 13:19:40.191811 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.192267 kubelet[1438]: E1216 13:19:40.192235 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.192349 kubelet[1438]: W1216 13:19:40.192266 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.192349 kubelet[1438]: E1216 13:19:40.192297 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.197986 kubelet[1438]: E1216 13:19:40.197951 1438 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:40.198234 kubelet[1438]: W1216 13:19:40.198215 1438 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:40.198338 kubelet[1438]: E1216 13:19:40.198324 1438 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:40.316541 kubelet[1438]: E1216 13:19:40.316302 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:19:40.320326 env[1192]: time="2024-12-16T13:19:40.320044248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hxkl5,Uid:2a3d52e4-bc7a-499b-9b7b-18e43c193e3a,Namespace:kube-system,Attempt:0,}" Dec 16 13:19:40.327962 kubelet[1438]: E1216 13:19:40.327897 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:19:40.329148 env[1192]: time="2024-12-16T13:19:40.329044112Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-62kq2,Uid:2fa84e98-ef27-49d5-857e-e5a714e0c313,Namespace:calico-system,Attempt:0,}" Dec 16 13:19:40.993148 env[1192]: time="2024-12-16T13:19:40.993031390Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:40.994839 env[1192]: time="2024-12-16T13:19:40.994769422Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:40.996961 env[1192]: time="2024-12-16T13:19:40.996910528Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:40.999068 kubelet[1438]: E1216 13:19:40.998993 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:41.000996 env[1192]: time="2024-12-16T13:19:41.000931708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:41.003167 env[1192]: time="2024-12-16T13:19:41.003101154Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:41.006554 env[1192]: time="2024-12-16T13:19:41.006497935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:41.008235 env[1192]: time="2024-12-16T13:19:41.008191187Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:41.009747 env[1192]: time="2024-12-16T13:19:41.009710363Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:41.041727 env[1192]: time="2024-12-16T13:19:41.041644733Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:41.042335 env[1192]: time="2024-12-16T13:19:41.042261791Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:41.042608 env[1192]: time="2024-12-16T13:19:41.042555615Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:41.043179 env[1192]: time="2024-12-16T13:19:41.043064450Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1b9678790bb83073a9633c55707f72f7acc78224767a7fe6ebb76c9b2277a433 pid=1570 runtime=io.containerd.runc.v2 Dec 16 13:19:41.055494 env[1192]: time="2024-12-16T13:19:41.055024095Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:41.055494 env[1192]: time="2024-12-16T13:19:41.055079641Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:41.055494 env[1192]: time="2024-12-16T13:19:41.055090961Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:41.056473 env[1192]: time="2024-12-16T13:19:41.056342066Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ac67c543d4c12cd50f118009b802f75ccd0509c104552cc2bac87da03d4824a8 pid=1583 runtime=io.containerd.runc.v2 Dec 16 13:19:41.080328 systemd[1]: Started cri-containerd-1b9678790bb83073a9633c55707f72f7acc78224767a7fe6ebb76c9b2277a433.scope. Dec 16 13:19:41.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.104000 audit: BPF prog-id=55 op=LOAD Dec 16 13:19:41.105000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.105000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1570 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:41.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162393637383739306262383330373361393633336335353730376637 Dec 16 13:19:41.106000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.106000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1570 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:41.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162393637383739306262383330373361393633336335353730376637 Dec 16 13:19:41.106000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.106000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.106000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.106000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.106000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.106000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.106000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.106000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.106000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.106000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.106000 audit: BPF prog-id=56 op=LOAD Dec 16 13:19:41.106000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00027c2a0 items=0 ppid=1570 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:41.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162393637383739306262383330373361393633336335353730376637 Dec 16 13:19:41.107000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.107000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.107000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.107000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.107000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.107000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.107000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.107000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.107000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.107000 audit: BPF prog-id=57 op=LOAD Dec 16 13:19:41.107000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00027c2e8 items=0 ppid=1570 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:41.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162393637383739306262383330373361393633336335353730376637 Dec 16 13:19:41.107000 audit: BPF prog-id=57 op=UNLOAD Dec 16 13:19:41.108000 audit: BPF prog-id=56 op=UNLOAD Dec 16 13:19:41.108000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.108000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.108000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.108000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.108000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.108000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.108000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.108000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.108000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.108000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.108000 audit: BPF prog-id=58 op=LOAD Dec 16 13:19:41.108000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00027c6f8 items=0 ppid=1570 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:41.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162393637383739306262383330373361393633336335353730376637 Dec 16 13:19:41.124211 systemd[1]: Started cri-containerd-ac67c543d4c12cd50f118009b802f75ccd0509c104552cc2bac87da03d4824a8.scope. Dec 16 13:19:41.150058 env[1192]: time="2024-12-16T13:19:41.149731281Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-62kq2,Uid:2fa84e98-ef27-49d5-857e-e5a714e0c313,Namespace:calico-system,Attempt:0,} returns sandbox id \"1b9678790bb83073a9633c55707f72f7acc78224767a7fe6ebb76c9b2277a433\"" Dec 16 13:19:41.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.152000 audit: BPF prog-id=59 op=LOAD Dec 16 13:19:41.155748 kubelet[1438]: E1216 13:19:41.154807 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:19:41.161743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3061998111.mount: Deactivated successfully. Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1583 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:41.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363763353433643463313263643530663131383030396238303266 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1583 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:41.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363763353433643463313263643530663131383030396238303266 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit: BPF prog-id=60 op=LOAD Dec 16 13:19:41.164000 audit[1599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002850e0 items=0 ppid=1583 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:41.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363763353433643463313263643530663131383030396238303266 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.164000 audit: BPF prog-id=61 op=LOAD Dec 16 13:19:41.164000 audit[1599]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000285128 items=0 ppid=1583 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:41.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363763353433643463313263643530663131383030396238303266 Dec 16 13:19:41.165000 audit: BPF prog-id=61 op=UNLOAD Dec 16 13:19:41.165000 audit: BPF prog-id=60 op=UNLOAD Dec 16 13:19:41.165000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.165000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.165000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.165000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.165000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.165000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.165000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.165000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.165000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.165000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:41.165000 audit: BPF prog-id=62 op=LOAD Dec 16 13:19:41.165000 audit[1599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000285538 items=0 ppid=1583 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:41.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363763353433643463313263643530663131383030396238303266 Dec 16 13:19:41.168868 env[1192]: time="2024-12-16T13:19:41.168824459Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 16 13:19:41.186670 env[1192]: time="2024-12-16T13:19:41.186611239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hxkl5,Uid:2a3d52e4-bc7a-499b-9b7b-18e43c193e3a,Namespace:kube-system,Attempt:0,} returns sandbox id \"ac67c543d4c12cd50f118009b802f75ccd0509c104552cc2bac87da03d4824a8\"" Dec 16 13:19:41.188914 kubelet[1438]: E1216 13:19:41.188211 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:19:41.213308 kubelet[1438]: E1216 13:19:41.213226 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw68p" podUID="0d56ae2d-4bfb-4820-982c-56c604fe9994" Dec 16 13:19:41.999842 kubelet[1438]: E1216 13:19:41.999715 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:42.563102 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1345831063.mount: Deactivated successfully. Dec 16 13:19:42.781381 env[1192]: time="2024-12-16T13:19:42.781312864Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:42.784295 env[1192]: time="2024-12-16T13:19:42.784249032Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:42.786339 env[1192]: time="2024-12-16T13:19:42.786283369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:42.788694 env[1192]: time="2024-12-16T13:19:42.788632618Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:42.789270 env[1192]: time="2024-12-16T13:19:42.789229820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 16 13:19:42.792418 env[1192]: time="2024-12-16T13:19:42.792358795Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 16 13:19:42.793894 env[1192]: time="2024-12-16T13:19:42.793828919Z" level=info msg="CreateContainer within sandbox \"1b9678790bb83073a9633c55707f72f7acc78224767a7fe6ebb76c9b2277a433\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 16 13:19:42.810250 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1680637063.mount: Deactivated successfully. Dec 16 13:19:42.820403 env[1192]: time="2024-12-16T13:19:42.820252374Z" level=info msg="CreateContainer within sandbox \"1b9678790bb83073a9633c55707f72f7acc78224767a7fe6ebb76c9b2277a433\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6225f2669a5bbbcfa8d95fae244d5a6079da59a4f7e1d42617af8599cc176110\"" Dec 16 13:19:42.822193 env[1192]: time="2024-12-16T13:19:42.822156547Z" level=info msg="StartContainer for \"6225f2669a5bbbcfa8d95fae244d5a6079da59a4f7e1d42617af8599cc176110\"" Dec 16 13:19:42.858428 systemd[1]: Started cri-containerd-6225f2669a5bbbcfa8d95fae244d5a6079da59a4f7e1d42617af8599cc176110.scope. Dec 16 13:19:42.903547 kernel: kauditd_printk_skb: 334 callbacks suppressed Dec 16 13:19:42.903749 kernel: audit: type=1400 audit(1734355182.892:467): avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.903799 kernel: audit: type=1300 audit(1734355182.892:467): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe411ed9178 items=0 ppid=1570 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.892000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe411ed9178 items=0 ppid=1570 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323566323636396135626262636661386439356661653234346435 Dec 16 13:19:42.910655 kernel: audit: type=1327 audit(1734355182.892:467): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323566323636396135626262636661386439356661653234346435 Dec 16 13:19:42.910763 kernel: audit: type=1400 audit(1734355182.892:468): avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.919326 kernel: audit: type=1400 audit(1734355182.892:468): avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.925148 kernel: audit: type=1400 audit(1734355182.892:468): avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.931948 kernel: audit: type=1400 audit(1734355182.892:468): avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.932072 kernel: audit: type=1400 audit(1734355182.892:468): avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.939140 kernel: audit: type=1400 audit(1734355182.892:468): avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.939254 kernel: audit: type=1400 audit(1734355182.892:468): avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.892000 audit: BPF prog-id=63 op=LOAD Dec 16 13:19:42.892000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c61f8 items=0 ppid=1570 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323566323636396135626262636661386439356661653234346435 Dec 16 13:19:42.894000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.894000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.894000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.894000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.894000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.894000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.894000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.894000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.894000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.894000 audit: BPF prog-id=64 op=LOAD Dec 16 13:19:42.894000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003c6248 items=0 ppid=1570 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323566323636396135626262636661386439356661653234346435 Dec 16 13:19:42.897000 audit: BPF prog-id=64 op=UNLOAD Dec 16 13:19:42.897000 audit: BPF prog-id=63 op=UNLOAD Dec 16 13:19:42.897000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.897000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.897000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.897000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.897000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.897000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.897000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.897000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.897000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.897000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.897000 audit: BPF prog-id=65 op=LOAD Dec 16 13:19:42.897000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c62d8 items=0 ppid=1570 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323566323636396135626262636661386439356661653234346435 Dec 16 13:19:42.946829 env[1192]: time="2024-12-16T13:19:42.946775171Z" level=info msg="StartContainer for \"6225f2669a5bbbcfa8d95fae244d5a6079da59a4f7e1d42617af8599cc176110\" returns successfully" Dec 16 13:19:42.970548 systemd[1]: cri-containerd-6225f2669a5bbbcfa8d95fae244d5a6079da59a4f7e1d42617af8599cc176110.scope: Deactivated successfully. Dec 16 13:19:42.973000 audit: BPF prog-id=65 op=UNLOAD Dec 16 13:19:43.000616 kubelet[1438]: E1216 13:19:43.000537 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:43.050597 env[1192]: time="2024-12-16T13:19:43.050514371Z" level=info msg="shim disconnected" id=6225f2669a5bbbcfa8d95fae244d5a6079da59a4f7e1d42617af8599cc176110 Dec 16 13:19:43.050597 env[1192]: time="2024-12-16T13:19:43.050591779Z" level=warning msg="cleaning up after shim disconnected" id=6225f2669a5bbbcfa8d95fae244d5a6079da59a4f7e1d42617af8599cc176110 namespace=k8s.io Dec 16 13:19:43.050597 env[1192]: time="2024-12-16T13:19:43.050614558Z" level=info msg="cleaning up dead shim" Dec 16 13:19:43.081407 env[1192]: time="2024-12-16T13:19:43.078814912Z" level=warning msg="cleanup warnings time=\"2024-12-16T13:19:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1690 runtime=io.containerd.runc.v2\n" Dec 16 13:19:43.212769 kubelet[1438]: E1216 13:19:43.212661 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw68p" podUID="0d56ae2d-4bfb-4820-982c-56c604fe9994" Dec 16 13:19:43.232468 kubelet[1438]: E1216 13:19:43.232171 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:19:43.470443 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6225f2669a5bbbcfa8d95fae244d5a6079da59a4f7e1d42617af8599cc176110-rootfs.mount: Deactivated successfully. Dec 16 13:19:44.001575 kubelet[1438]: E1216 13:19:44.001515 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:44.074974 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount900989046.mount: Deactivated successfully. Dec 16 13:19:45.002476 kubelet[1438]: E1216 13:19:45.002367 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:45.083135 env[1192]: time="2024-12-16T13:19:45.083046532Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:45.085866 env[1192]: time="2024-12-16T13:19:45.085804550Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:45.087970 env[1192]: time="2024-12-16T13:19:45.087922102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:45.089866 env[1192]: time="2024-12-16T13:19:45.089809820Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:45.090772 env[1192]: time="2024-12-16T13:19:45.090712332Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 16 13:19:45.093149 env[1192]: time="2024-12-16T13:19:45.092980403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 16 13:19:45.094947 env[1192]: time="2024-12-16T13:19:45.094861885Z" level=info msg="CreateContainer within sandbox \"ac67c543d4c12cd50f118009b802f75ccd0509c104552cc2bac87da03d4824a8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 16 13:19:45.121188 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2667832562.mount: Deactivated successfully. Dec 16 13:19:45.132420 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4186575533.mount: Deactivated successfully. Dec 16 13:19:45.137077 env[1192]: time="2024-12-16T13:19:45.137008610Z" level=info msg="CreateContainer within sandbox \"ac67c543d4c12cd50f118009b802f75ccd0509c104552cc2bac87da03d4824a8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d0d581113389b9498c564bd1c08d2118c7a1b6e080ebf27b9ee8a5a0a55d10e2\"" Dec 16 13:19:45.138832 env[1192]: time="2024-12-16T13:19:45.138723964Z" level=info msg="StartContainer for \"d0d581113389b9498c564bd1c08d2118c7a1b6e080ebf27b9ee8a5a0a55d10e2\"" Dec 16 13:19:45.175212 systemd[1]: Started cri-containerd-d0d581113389b9498c564bd1c08d2118c7a1b6e080ebf27b9ee8a5a0a55d10e2.scope. Dec 16 13:19:45.213915 kubelet[1438]: E1216 13:19:45.213291 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw68p" podUID="0d56ae2d-4bfb-4820-982c-56c604fe9994" Dec 16 13:19:45.216000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.216000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001956b0 a2=3c a3=7fe3e84d7bd8 items=0 ppid=1583 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643538313131333338396239343938633536346264316330386432 Dec 16 13:19:45.216000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.216000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.216000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.216000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.216000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.216000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.216000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.216000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.216000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.216000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.216000 audit: BPF prog-id=66 op=LOAD Dec 16 13:19:45.216000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001959d8 a2=78 a3=c0000a2948 items=0 ppid=1583 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643538313131333338396239343938633536346264316330386432 Dec 16 13:19:45.218000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.218000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.218000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.218000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.218000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.218000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.218000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.218000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.218000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.218000 audit: BPF prog-id=67 op=LOAD Dec 16 13:19:45.218000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000195770 a2=78 a3=c0000a2998 items=0 ppid=1583 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643538313131333338396239343938633536346264316330386432 Dec 16 13:19:45.219000 audit: BPF prog-id=67 op=UNLOAD Dec 16 13:19:45.219000 audit: BPF prog-id=66 op=UNLOAD Dec 16 13:19:45.219000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.219000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.219000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.219000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.219000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.219000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.219000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.219000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.219000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.219000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.219000 audit: BPF prog-id=68 op=LOAD Dec 16 13:19:45.219000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000195c30 a2=78 a3=c0000a2a28 items=0 ppid=1583 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643538313131333338396239343938633536346264316330386432 Dec 16 13:19:45.252725 env[1192]: time="2024-12-16T13:19:45.252551676Z" level=info msg="StartContainer for \"d0d581113389b9498c564bd1c08d2118c7a1b6e080ebf27b9ee8a5a0a55d10e2\" returns successfully" Dec 16 13:19:45.471000 audit[1774]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.471000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5c982760 a2=0 a3=7ffd5c98274c items=0 ppid=1726 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 16 13:19:45.472000 audit[1775]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.472000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffece599b10 a2=0 a3=7ffece599afc items=0 ppid=1726 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 16 13:19:45.473000 audit[1776]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.473000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc84c8a4a0 a2=0 a3=7ffc84c8a48c items=0 ppid=1726 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.473000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 16 13:19:45.475000 audit[1777]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.475000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9b80b9c0 a2=0 a3=7ffd9b80b9ac items=0 ppid=1726 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 16 13:19:45.476000 audit[1778]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.476000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef8ac3640 a2=0 a3=7ffef8ac362c items=0 ppid=1726 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 16 13:19:45.478000 audit[1779]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.478000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe065a6f80 a2=0 a3=7ffe065a6f6c items=0 ppid=1726 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 16 13:19:45.580000 audit[1780]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.580000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcfd98bd00 a2=0 a3=7ffcfd98bcec items=0 ppid=1726 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 16 13:19:45.585000 audit[1782]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.585000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffca090aef0 a2=0 a3=7ffca090aedc items=0 ppid=1726 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 16 13:19:45.591000 audit[1785]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.591000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff94c8fbc0 a2=0 a3=7fff94c8fbac items=0 ppid=1726 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 16 13:19:45.593000 audit[1786]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.593000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff58d7dc20 a2=0 a3=7fff58d7dc0c items=0 ppid=1726 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 16 13:19:45.597000 audit[1788]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.597000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb241a7b0 a2=0 a3=7ffeb241a79c items=0 ppid=1726 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 16 13:19:45.599000 audit[1789]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.599000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb02dacc0 a2=0 a3=7ffeb02dacac items=0 ppid=1726 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 16 13:19:45.602000 audit[1791]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.602000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc54fc9e20 a2=0 a3=7ffc54fc9e0c items=0 ppid=1726 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 16 13:19:45.608000 audit[1794]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.608000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffc0787830 a2=0 a3=7fffc078781c items=0 ppid=1726 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 16 13:19:45.609000 audit[1795]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.609000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2a5a86d0 a2=0 a3=7fff2a5a86bc items=0 ppid=1726 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 16 13:19:45.613000 audit[1797]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.613000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd9288400 a2=0 a3=7ffcd92883ec items=0 ppid=1726 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 16 13:19:45.615000 audit[1798]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.615000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb8d0e990 a2=0 a3=7ffcb8d0e97c items=0 ppid=1726 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 16 13:19:45.620000 audit[1800]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.620000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcaac64a70 a2=0 a3=7ffcaac64a5c items=0 ppid=1726 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.620000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 16 13:19:45.626000 audit[1803]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.626000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffecd447700 a2=0 a3=7ffecd4476ec items=0 ppid=1726 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 16 13:19:45.633000 audit[1806]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.633000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2dc885b0 a2=0 a3=7ffd2dc8859c items=0 ppid=1726 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 16 13:19:45.635000 audit[1807]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.635000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd4cb67ac0 a2=0 a3=7ffd4cb67aac items=0 ppid=1726 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 16 13:19:45.639000 audit[1809]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.639000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc897b3050 a2=0 a3=7ffc897b303c items=0 ppid=1726 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.639000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 16 13:19:45.671000 audit[1813]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.671000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdcc344900 a2=0 a3=7ffdcc3448ec items=0 ppid=1726 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 16 13:19:45.673000 audit[1814]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.673000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef704d570 a2=0 a3=7ffef704d55c items=0 ppid=1726 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 16 13:19:45.677000 audit[1816]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:45.677000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdca4e6650 a2=0 a3=7ffdca4e663c items=0 ppid=1726 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 16 13:19:45.725000 audit[1822]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:45.725000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdf56e8bd0 a2=0 a3=7ffdf56e8bbc items=0 ppid=1726 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.725000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:45.750000 audit[1822]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:45.750000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffdf56e8bd0 a2=0 a3=7ffdf56e8bbc items=0 ppid=1726 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.750000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:45.757000 audit[1830]: NETFILTER_CFG table=filter:41 family=2 entries=16 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:45.757000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcddfcbd90 a2=0 a3=7ffcddfcbd7c items=0 ppid=1726 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.757000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:45.761000 audit[1830]: NETFILTER_CFG table=nat:42 family=2 entries=14 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:45.761000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcddfcbd90 a2=0 a3=0 items=0 ppid=1726 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.761000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:45.767000 audit[1831]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.767000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdfb76a760 a2=0 a3=7ffdfb76a74c items=0 ppid=1726 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 16 13:19:45.773000 audit[1833]: NETFILTER_CFG table=filter:44 family=10 entries=2 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.773000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd96fdbc70 a2=0 a3=7ffd96fdbc5c items=0 ppid=1726 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 16 13:19:45.781000 audit[1836]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.781000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc4d35800 a2=0 a3=7ffcc4d357ec items=0 ppid=1726 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 16 13:19:45.784000 audit[1837]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.784000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5d151cd0 a2=0 a3=7fff5d151cbc items=0 ppid=1726 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.784000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 16 13:19:45.788000 audit[1839]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.788000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf21969e0 a2=0 a3=7ffdf21969cc items=0 ppid=1726 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 16 13:19:45.790000 audit[1840]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.790000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa947f410 a2=0 a3=7fffa947f3fc items=0 ppid=1726 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 16 13:19:45.794000 audit[1842]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.794000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffda31d9710 a2=0 a3=7ffda31d96fc items=0 ppid=1726 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.794000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 16 13:19:45.799000 audit[1845]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.799000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffed49bab60 a2=0 a3=7ffed49bab4c items=0 ppid=1726 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 16 13:19:45.801000 audit[1846]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.801000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdefed7d0 a2=0 a3=7fffdefed7bc items=0 ppid=1726 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 16 13:19:45.805000 audit[1848]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1848 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.805000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1bc140f0 a2=0 a3=7ffc1bc140dc items=0 ppid=1726 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 16 13:19:45.806000 audit[1849]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.806000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1b85a640 a2=0 a3=7fff1b85a62c items=0 ppid=1726 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 16 13:19:45.810000 audit[1851]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.810000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6e7e3ee0 a2=0 a3=7ffc6e7e3ecc items=0 ppid=1726 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 16 13:19:45.816000 audit[1854]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=1854 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.816000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5f433760 a2=0 a3=7fff5f43374c items=0 ppid=1726 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 16 13:19:45.821000 audit[1857]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.821000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbf8e90b0 a2=0 a3=7fffbf8e909c items=0 ppid=1726 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 16 13:19:45.823000 audit[1858]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.823000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe54e45a80 a2=0 a3=7ffe54e45a6c items=0 ppid=1726 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 16 13:19:45.827000 audit[1860]: NETFILTER_CFG table=nat:58 family=10 entries=2 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.827000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd4c047f40 a2=0 a3=7ffd4c047f2c items=0 ppid=1726 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 16 13:19:45.833000 audit[1863]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.833000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffb3ae3910 a2=0 a3=7fffb3ae38fc items=0 ppid=1726 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 16 13:19:45.836000 audit[1864]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.836000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe036e6800 a2=0 a3=7ffe036e67ec items=0 ppid=1726 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 16 13:19:45.841000 audit[1866]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.841000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffccea53020 a2=0 a3=7ffccea5300c items=0 ppid=1726 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 16 13:19:45.843000 audit[1867]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.843000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff49281720 a2=0 a3=7fff4928170c items=0 ppid=1726 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 16 13:19:45.848000 audit[1869]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.848000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe041e6e40 a2=0 a3=7ffe041e6e2c items=0 ppid=1726 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 16 13:19:45.854000 audit[1872]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:45.854000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff0fe67460 a2=0 a3=7fff0fe6744c items=0 ppid=1726 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.854000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 16 13:19:45.860000 audit[1874]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 16 13:19:45.860000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffccfc7e500 a2=0 a3=7ffccfc7e4ec items=0 ppid=1726 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.860000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:45.861000 audit[1874]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 16 13:19:45.861000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffccfc7e500 a2=0 a3=7ffccfc7e4ec items=0 ppid=1726 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.861000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:46.003294 kubelet[1438]: E1216 13:19:46.003219 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:46.236000 audit[1876]: NETFILTER_CFG table=filter:67 family=2 entries=16 op=nft_register_rule pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:46.236000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe7236df40 a2=0 a3=7ffe7236df2c items=0 ppid=1726 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:46.238000 audit[1876]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_rule pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:46.238000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe7236df40 a2=0 a3=0 items=0 ppid=1726 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:46.243173 kubelet[1438]: E1216 13:19:46.243102 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:19:46.290260 kubelet[1438]: I1216 13:19:46.290163 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-hxkl5" podStartSLOduration=4.387068665 podStartE2EDuration="8.290102253s" podCreationTimestamp="2024-12-16 13:19:38 +0000 UTC" firstStartedPulling="2024-12-16 13:19:41.189349729 +0000 UTC m=+3.750382809" lastFinishedPulling="2024-12-16 13:19:45.092383315 +0000 UTC m=+7.653416397" observedRunningTime="2024-12-16 13:19:46.2722838 +0000 UTC m=+8.833316890" watchObservedRunningTime="2024-12-16 13:19:46.290102253 +0000 UTC m=+8.851135345" Dec 16 13:19:47.003606 kubelet[1438]: E1216 13:19:47.003527 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:47.189000 audit[1879]: NETFILTER_CFG table=filter:69 family=2 entries=13 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:47.189000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffeaa577130 a2=0 a3=7ffeaa57711c items=0 ppid=1726 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:47.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:47.195000 audit[1879]: NETFILTER_CFG table=nat:70 family=2 entries=35 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:47.195000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffeaa577130 a2=0 a3=7ffeaa57711c items=0 ppid=1726 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:47.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:47.213419 kubelet[1438]: E1216 13:19:47.213013 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw68p" podUID="0d56ae2d-4bfb-4820-982c-56c604fe9994" Dec 16 13:19:47.245410 kubelet[1438]: E1216 13:19:47.245135 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:19:48.004279 kubelet[1438]: E1216 13:19:48.004217 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:48.219359 kernel: kauditd_printk_skb: 248 callbacks suppressed Dec 16 13:19:48.219540 kernel: audit: type=1325 audit(1734355188.214:537): table=filter:71 family=2 entries=10 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:48.214000 audit[1883]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:48.232327 kernel: audit: type=1300 audit(1734355188.214:537): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc7efd6f90 a2=0 a3=7ffc7efd6f7c items=0 ppid=1726 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.232471 kernel: audit: type=1327 audit(1734355188.214:537): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:48.232498 kernel: audit: type=1325 audit(1734355188.227:538): table=nat:72 family=2 entries=44 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:48.214000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc7efd6f90 a2=0 a3=7ffc7efd6f7c items=0 ppid=1726 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:48.227000 audit[1883]: NETFILTER_CFG table=nat:72 family=2 entries=44 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:48.240326 kernel: audit: type=1300 audit(1734355188.227:538): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc7efd6f90 a2=0 a3=7ffc7efd6f7c items=0 ppid=1726 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.240513 kernel: audit: type=1327 audit(1734355188.227:538): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:48.227000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc7efd6f90 a2=0 a3=7ffc7efd6f7c items=0 ppid=1726 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.227000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:49.005563 kubelet[1438]: E1216 13:19:49.005505 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:49.213203 kubelet[1438]: E1216 13:19:49.213144 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw68p" podUID="0d56ae2d-4bfb-4820-982c-56c604fe9994" Dec 16 13:19:49.234000 audit[1885]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:49.242296 kernel: audit: type=1325 audit(1734355189.234:539): table=filter:73 family=2 entries=10 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:49.242439 kernel: audit: type=1300 audit(1734355189.234:539): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd86a2bb60 a2=0 a3=7ffd86a2bb4c items=0 ppid=1726 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:49.234000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd86a2bb60 a2=0 a3=7ffd86a2bb4c items=0 ppid=1726 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:49.245035 kernel: audit: type=1327 audit(1734355189.234:539): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:49.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:49.253000 audit[1885]: NETFILTER_CFG table=nat:74 family=2 entries=56 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:49.253000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd86a2bb60 a2=0 a3=7ffd86a2bb4c items=0 ppid=1726 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:49.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:49.259146 kernel: audit: type=1325 audit(1734355189.253:540): table=nat:74 family=2 entries=56 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:49.586571 env[1192]: time="2024-12-16T13:19:49.586316811Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:49.588221 env[1192]: time="2024-12-16T13:19:49.588183681Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:49.589583 env[1192]: time="2024-12-16T13:19:49.589539118Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:49.590824 env[1192]: time="2024-12-16T13:19:49.590791151Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:49.591698 env[1192]: time="2024-12-16T13:19:49.591659059Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 16 13:19:49.594756 env[1192]: time="2024-12-16T13:19:49.594714400Z" level=info msg="CreateContainer within sandbox \"1b9678790bb83073a9633c55707f72f7acc78224767a7fe6ebb76c9b2277a433\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 16 13:19:49.610737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1342645029.mount: Deactivated successfully. Dec 16 13:19:49.617959 env[1192]: time="2024-12-16T13:19:49.617910225Z" level=info msg="CreateContainer within sandbox \"1b9678790bb83073a9633c55707f72f7acc78224767a7fe6ebb76c9b2277a433\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"012e8f64ab5e853c09bf9db8395da8a0cd7d2d19b9df7f22f384be7d37170c99\"" Dec 16 13:19:49.619428 env[1192]: time="2024-12-16T13:19:49.619263923Z" level=info msg="StartContainer for \"012e8f64ab5e853c09bf9db8395da8a0cd7d2d19b9df7f22f384be7d37170c99\"" Dec 16 13:19:49.649105 systemd[1]: Started cri-containerd-012e8f64ab5e853c09bf9db8395da8a0cd7d2d19b9df7f22f384be7d37170c99.scope. Dec 16 13:19:49.687000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.687000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe26870ea48 items=0 ppid=1570 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:49.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031326538663634616235653835336330396266396462383339356461 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit: BPF prog-id=69 op=LOAD Dec 16 13:19:49.688000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00037e2b8 items=0 ppid=1570 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:49.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031326538663634616235653835336330396266396462383339356461 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.688000 audit: BPF prog-id=70 op=LOAD Dec 16 13:19:49.688000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00037e308 items=0 ppid=1570 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:49.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031326538663634616235653835336330396266396462383339356461 Dec 16 13:19:49.689000 audit: BPF prog-id=70 op=UNLOAD Dec 16 13:19:49.689000 audit: BPF prog-id=69 op=UNLOAD Dec 16 13:19:49.689000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.689000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.689000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.689000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.689000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.689000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.689000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.689000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.689000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.689000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:49.689000 audit: BPF prog-id=71 op=LOAD Dec 16 13:19:49.689000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00037e398 items=0 ppid=1570 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:49.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031326538663634616235653835336330396266396462383339356461 Dec 16 13:19:49.709152 env[1192]: time="2024-12-16T13:19:49.708951117Z" level=info msg="StartContainer for \"012e8f64ab5e853c09bf9db8395da8a0cd7d2d19b9df7f22f384be7d37170c99\" returns successfully" Dec 16 13:19:50.006648 kubelet[1438]: E1216 13:19:50.006492 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:50.251667 kubelet[1438]: E1216 13:19:50.251617 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:19:50.272000 audit[1923]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:50.272000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffbd8c00d0 a2=0 a3=7fffbd8c00bc items=0 ppid=1726 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:50.272000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:50.277000 audit[1923]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:50.277000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffbd8c00d0 a2=0 a3=7fffbd8c00bc items=0 ppid=1726 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:50.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:50.402001 systemd[1]: cri-containerd-012e8f64ab5e853c09bf9db8395da8a0cd7d2d19b9df7f22f384be7d37170c99.scope: Deactivated successfully. Dec 16 13:19:50.405000 audit: BPF prog-id=71 op=UNLOAD Dec 16 13:19:50.489157 kubelet[1438]: I1216 13:19:50.488311 1438 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 16 13:19:50.517178 env[1192]: time="2024-12-16T13:19:50.517093088Z" level=info msg="shim disconnected" id=012e8f64ab5e853c09bf9db8395da8a0cd7d2d19b9df7f22f384be7d37170c99 Dec 16 13:19:50.517424 env[1192]: time="2024-12-16T13:19:50.517402167Z" level=warning msg="cleaning up after shim disconnected" id=012e8f64ab5e853c09bf9db8395da8a0cd7d2d19b9df7f22f384be7d37170c99 namespace=k8s.io Dec 16 13:19:50.517546 env[1192]: time="2024-12-16T13:19:50.517514569Z" level=info msg="cleaning up dead shim" Dec 16 13:19:50.530851 env[1192]: time="2024-12-16T13:19:50.530710404Z" level=warning msg="cleanup warnings time=\"2024-12-16T13:19:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1937 runtime=io.containerd.runc.v2\n" Dec 16 13:19:50.607253 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-012e8f64ab5e853c09bf9db8395da8a0cd7d2d19b9df7f22f384be7d37170c99-rootfs.mount: Deactivated successfully. Dec 16 13:19:50.967000 audit[1951]: NETFILTER_CFG table=filter:77 family=2 entries=9 op=nft_register_rule pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:50.967000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe482f8860 a2=0 a3=7ffe482f884c items=0 ppid=1726 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:50.967000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:50.971000 audit[1951]: NETFILTER_CFG table=nat:78 family=2 entries=27 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:50.971000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe482f8860 a2=0 a3=7ffe482f884c items=0 ppid=1726 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:50.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:51.007958 kubelet[1438]: E1216 13:19:51.007886 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:51.217879 systemd[1]: Created slice kubepods-besteffort-pod0d56ae2d_4bfb_4820_982c_56c604fe9994.slice. Dec 16 13:19:51.221650 env[1192]: time="2024-12-16T13:19:51.221045270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bw68p,Uid:0d56ae2d-4bfb-4820-982c-56c604fe9994,Namespace:calico-system,Attempt:0,}" Dec 16 13:19:51.256147 kubelet[1438]: E1216 13:19:51.255501 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:19:51.256725 env[1192]: time="2024-12-16T13:19:51.256690936Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 16 13:19:51.305487 env[1192]: time="2024-12-16T13:19:51.305396288Z" level=error msg="Failed to destroy network for sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:51.309359 env[1192]: time="2024-12-16T13:19:51.308001588Z" level=error msg="encountered an error cleaning up failed sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:51.309359 env[1192]: time="2024-12-16T13:19:51.308101021Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bw68p,Uid:0d56ae2d-4bfb-4820-982c-56c604fe9994,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:51.309463 kubelet[1438]: E1216 13:19:51.309029 1438 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:51.309463 kubelet[1438]: E1216 13:19:51.309085 1438 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bw68p" Dec 16 13:19:51.309463 kubelet[1438]: E1216 13:19:51.309105 1438 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bw68p" Dec 16 13:19:51.307501 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9-shm.mount: Deactivated successfully. Dec 16 13:19:51.309646 kubelet[1438]: E1216 13:19:51.309176 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bw68p_calico-system(0d56ae2d-4bfb-4820-982c-56c604fe9994)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bw68p_calico-system(0d56ae2d-4bfb-4820-982c-56c604fe9994)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bw68p" podUID="0d56ae2d-4bfb-4820-982c-56c604fe9994" Dec 16 13:19:51.788000 audit[1982]: NETFILTER_CFG table=filter:79 family=2 entries=8 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:51.788000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffefdabf5f0 a2=0 a3=7ffefdabf5dc items=0 ppid=1726 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.788000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:51.793000 audit[1982]: NETFILTER_CFG table=nat:80 family=2 entries=34 op=nft_register_chain pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:51.793000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffefdabf5f0 a2=0 a3=7ffefdabf5dc items=0 ppid=1726 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:51.880259 systemd[1]: Created slice kubepods-besteffort-pod43382018_3d8f_40b1_9383_fcc5b1997629.slice. Dec 16 13:19:51.927133 kubelet[1438]: I1216 13:19:51.927063 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gb47p\" (UniqueName: \"kubernetes.io/projected/43382018-3d8f-40b1-9383-fcc5b1997629-kube-api-access-gb47p\") pod \"nginx-deployment-8587fbcb89-zc8n2\" (UID: \"43382018-3d8f-40b1-9383-fcc5b1997629\") " pod="default/nginx-deployment-8587fbcb89-zc8n2" Dec 16 13:19:52.008663 kubelet[1438]: E1216 13:19:52.008583 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:52.183826 env[1192]: time="2024-12-16T13:19:52.183364412Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-zc8n2,Uid:43382018-3d8f-40b1-9383-fcc5b1997629,Namespace:default,Attempt:0,}" Dec 16 13:19:52.257718 kubelet[1438]: I1216 13:19:52.257686 1438 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:19:52.258769 env[1192]: time="2024-12-16T13:19:52.258664377Z" level=info msg="StopPodSandbox for \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\"" Dec 16 13:19:52.269064 env[1192]: time="2024-12-16T13:19:52.269005381Z" level=error msg="Failed to destroy network for sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:52.271419 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c-shm.mount: Deactivated successfully. Dec 16 13:19:52.272843 env[1192]: time="2024-12-16T13:19:52.272613661Z" level=error msg="encountered an error cleaning up failed sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:52.272843 env[1192]: time="2024-12-16T13:19:52.272684675Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-zc8n2,Uid:43382018-3d8f-40b1-9383-fcc5b1997629,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:52.272972 kubelet[1438]: E1216 13:19:52.272912 1438 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:52.273021 kubelet[1438]: E1216 13:19:52.272971 1438 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-zc8n2" Dec 16 13:19:52.273021 kubelet[1438]: E1216 13:19:52.273002 1438 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-zc8n2" Dec 16 13:19:52.273081 kubelet[1438]: E1216 13:19:52.273054 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-zc8n2_default(43382018-3d8f-40b1-9383-fcc5b1997629)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-zc8n2_default(43382018-3d8f-40b1-9383-fcc5b1997629)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-zc8n2" podUID="43382018-3d8f-40b1-9383-fcc5b1997629" Dec 16 13:19:52.299881 env[1192]: time="2024-12-16T13:19:52.299788708Z" level=error msg="StopPodSandbox for \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\" failed" error="failed to destroy network for sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:52.300446 kubelet[1438]: E1216 13:19:52.300398 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:19:52.300562 kubelet[1438]: E1216 13:19:52.300480 1438 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9"} Dec 16 13:19:52.300603 kubelet[1438]: E1216 13:19:52.300560 1438 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0d56ae2d-4bfb-4820-982c-56c604fe9994\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 16 13:19:52.300677 kubelet[1438]: E1216 13:19:52.300595 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0d56ae2d-4bfb-4820-982c-56c604fe9994\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bw68p" podUID="0d56ae2d-4bfb-4820-982c-56c604fe9994" Dec 16 13:19:53.009936 kubelet[1438]: E1216 13:19:53.009859 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:53.261352 kubelet[1438]: I1216 13:19:53.260256 1438 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:19:53.261736 env[1192]: time="2024-12-16T13:19:53.261700803Z" level=info msg="StopPodSandbox for \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\"" Dec 16 13:19:53.331902 env[1192]: time="2024-12-16T13:19:53.331835112Z" level=error msg="StopPodSandbox for \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\" failed" error="failed to destroy network for sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:53.332321 kubelet[1438]: E1216 13:19:53.332279 1438 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:19:53.332501 kubelet[1438]: E1216 13:19:53.332336 1438 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c"} Dec 16 13:19:53.332501 kubelet[1438]: E1216 13:19:53.332374 1438 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"43382018-3d8f-40b1-9383-fcc5b1997629\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 16 13:19:53.332501 kubelet[1438]: E1216 13:19:53.332408 1438 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"43382018-3d8f-40b1-9383-fcc5b1997629\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-zc8n2" podUID="43382018-3d8f-40b1-9383-fcc5b1997629" Dec 16 13:19:54.011153 kubelet[1438]: E1216 13:19:54.011057 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:55.011993 kubelet[1438]: E1216 13:19:55.011936 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:56.013001 kubelet[1438]: E1216 13:19:56.012926 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:57.014155 kubelet[1438]: E1216 13:19:57.014093 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:57.993012 kubelet[1438]: E1216 13:19:57.992968 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:58.014956 kubelet[1438]: E1216 13:19:58.014889 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:58.434539 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2043125654.mount: Deactivated successfully. Dec 16 13:19:58.484404 env[1192]: time="2024-12-16T13:19:58.484352650Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:58.487064 env[1192]: time="2024-12-16T13:19:58.487019759Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:58.488754 env[1192]: time="2024-12-16T13:19:58.488710622Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:58.490205 env[1192]: time="2024-12-16T13:19:58.490172709Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:58.490760 env[1192]: time="2024-12-16T13:19:58.490724982Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 16 13:19:58.509973 env[1192]: time="2024-12-16T13:19:58.509929714Z" level=info msg="CreateContainer within sandbox \"1b9678790bb83073a9633c55707f72f7acc78224767a7fe6ebb76c9b2277a433\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 16 13:19:58.527157 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2314063163.mount: Deactivated successfully. Dec 16 13:19:58.534826 env[1192]: time="2024-12-16T13:19:58.534765707Z" level=info msg="CreateContainer within sandbox \"1b9678790bb83073a9633c55707f72f7acc78224767a7fe6ebb76c9b2277a433\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e0cd00f502617fe903f92f6b01990461a33a5639a6c5032af603d90863d1d7e4\"" Dec 16 13:19:58.535976 env[1192]: time="2024-12-16T13:19:58.535931670Z" level=info msg="StartContainer for \"e0cd00f502617fe903f92f6b01990461a33a5639a6c5032af603d90863d1d7e4\"" Dec 16 13:19:58.562226 systemd[1]: Started cri-containerd-e0cd00f502617fe903f92f6b01990461a33a5639a6c5032af603d90863d1d7e4.scope. Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.596400 kernel: kauditd_printk_skb: 64 callbacks suppressed Dec 16 13:19:58.596465 kernel: audit: type=1400 audit(1734355198.593:554): avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.599252 kernel: audit: type=1300 audit(1734355198.593:554): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f5d709e62f8 items=0 ppid=1570 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:58.593000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f5d709e62f8 items=0 ppid=1570 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:58.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530636430306635303236313766653930336639326636623031393930 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.612131 kernel: audit: type=1327 audit(1734355198.593:554): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530636430306635303236313766653930336639326636623031393930 Dec 16 13:19:58.612298 kernel: audit: type=1400 audit(1734355198.593:555): avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.623862 kernel: audit: type=1400 audit(1734355198.593:555): avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.624019 kernel: audit: type=1400 audit(1734355198.593:555): avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.624064 kernel: audit: type=1400 audit(1734355198.593:555): avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.633316 kernel: audit: type=1400 audit(1734355198.593:555): avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.633468 kernel: audit: type=1400 audit(1734355198.593:555): avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.633504 kernel: audit: type=1400 audit(1734355198.593:555): avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit: BPF prog-id=72 op=LOAD Dec 16 13:19:58.593000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0000248b8 items=0 ppid=1570 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:58.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530636430306635303236313766653930336639326636623031393930 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.593000 audit: BPF prog-id=73 op=LOAD Dec 16 13:19:58.593000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000024908 items=0 ppid=1570 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:58.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530636430306635303236313766653930336639326636623031393930 Dec 16 13:19:58.594000 audit: BPF prog-id=73 op=UNLOAD Dec 16 13:19:58.594000 audit: BPF prog-id=72 op=UNLOAD Dec 16 13:19:58.594000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.594000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.594000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.594000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.594000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.594000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.594000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.594000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.594000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.594000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:58.594000 audit: BPF prog-id=74 op=LOAD Dec 16 13:19:58.594000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000024998 items=0 ppid=1570 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:58.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530636430306635303236313766653930336639326636623031393930 Dec 16 13:19:58.638826 env[1192]: time="2024-12-16T13:19:58.638767130Z" level=info msg="StartContainer for \"e0cd00f502617fe903f92f6b01990461a33a5639a6c5032af603d90863d1d7e4\" returns successfully" Dec 16 13:19:58.746769 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 16 13:19:58.746919 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 16 13:19:59.015976 kubelet[1438]: E1216 13:19:59.015920 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:19:59.274951 kubelet[1438]: E1216 13:19:59.274671 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:19:59.302214 kubelet[1438]: I1216 13:19:59.301669 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-62kq2" podStartSLOduration=3.966195668 podStartE2EDuration="21.301641761s" podCreationTimestamp="2024-12-16 13:19:38 +0000 UTC" firstStartedPulling="2024-12-16 13:19:41.156448566 +0000 UTC m=+3.717481633" lastFinishedPulling="2024-12-16 13:19:58.491894647 +0000 UTC m=+21.052927726" observedRunningTime="2024-12-16 13:19:59.301347373 +0000 UTC m=+21.862380485" watchObservedRunningTime="2024-12-16 13:19:59.301641761 +0000 UTC m=+21.862674847" Dec 16 13:20:00.017036 kubelet[1438]: E1216 13:20:00.016970 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:00.196000 audit[2190]: AVC avc: denied { write } for pid=2190 comm="tee" name="fd" dev="proc" ino=20692 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:20:00.196000 audit[2190]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9eb33a12 a2=241 a3=1b6 items=1 ppid=2164 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.207000 audit[2192]: AVC avc: denied { write } for pid=2192 comm="tee" name="fd" dev="proc" ino=19878 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:20:00.207000 audit[2192]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffedb64ca02 a2=241 a3=1b6 items=1 ppid=2160 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.207000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 16 13:20:00.196000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 16 13:20:00.196000 audit: PATH item=0 name="/dev/fd/63" inode=20684 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:00.196000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:20:00.209000 audit[2202]: AVC avc: denied { write } for pid=2202 comm="tee" name="fd" dev="proc" ino=20703 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:20:00.214000 audit[2194]: AVC avc: denied { write } for pid=2194 comm="tee" name="fd" dev="proc" ino=20704 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:20:00.214000 audit[2194]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed98dda03 a2=241 a3=1b6 items=1 ppid=2168 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.214000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 16 13:20:00.214000 audit: PATH item=0 name="/dev/fd/63" inode=20687 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:00.214000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:20:00.207000 audit: PATH item=0 name="/dev/fd/63" inode=19867 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:00.207000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:20:00.221000 audit[2196]: AVC avc: denied { write } for pid=2196 comm="tee" name="fd" dev="proc" ino=20708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:20:00.221000 audit[2196]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe2b44a13 a2=241 a3=1b6 items=1 ppid=2162 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.221000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 16 13:20:00.221000 audit: PATH item=0 name="/dev/fd/63" inode=19872 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:00.221000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:20:00.209000 audit[2202]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe06f38a12 a2=241 a3=1b6 items=1 ppid=2166 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.209000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 16 13:20:00.209000 audit: PATH item=0 name="/dev/fd/63" inode=20695 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:00.209000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:20:00.228000 audit[2203]: AVC avc: denied { write } for pid=2203 comm="tee" name="fd" dev="proc" ino=19887 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:20:00.228000 audit[2203]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcece06a12 a2=241 a3=1b6 items=1 ppid=2158 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.228000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 16 13:20:00.228000 audit: PATH item=0 name="/dev/fd/63" inode=19875 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:00.228000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:20:00.229000 audit[2221]: AVC avc: denied { write } for pid=2221 comm="tee" name="fd" dev="proc" ino=19891 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:20:00.229000 audit[2221]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe7b15a14 a2=241 a3=1b6 items=1 ppid=2173 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.229000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 16 13:20:00.229000 audit: PATH item=0 name="/dev/fd/63" inode=19883 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:00.229000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:20:00.276933 kubelet[1438]: E1216 13:20:00.276813 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:20:00.301463 systemd[1]: run-containerd-runc-k8s.io-e0cd00f502617fe903f92f6b01990461a33a5639a6c5032af603d90863d1d7e4-runc.sKwv9a.mount: Deactivated successfully. Dec 16 13:20:00.548000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.548000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.548000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.548000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.548000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.548000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.548000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.548000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.548000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.548000 audit: BPF prog-id=75 op=LOAD Dec 16 13:20:00.548000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffcfd75aa0 a2=98 a3=3 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.548000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.548000 audit: BPF prog-id=75 op=UNLOAD Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit: BPF prog-id=76 op=LOAD Dec 16 13:20:00.549000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcfd75880 a2=74 a3=540051 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.549000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.549000 audit: BPF prog-id=76 op=UNLOAD Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.549000 audit: BPF prog-id=77 op=LOAD Dec 16 13:20:00.549000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcfd758b0 a2=94 a3=2 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.549000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.549000 audit: BPF prog-id=77 op=UNLOAD Dec 16 13:20:00.677000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.677000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.677000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.677000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.677000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.677000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.677000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.677000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.677000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.677000 audit: BPF prog-id=78 op=LOAD Dec 16 13:20:00.677000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcfd75770 a2=40 a3=1 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.677000 audit: BPF prog-id=78 op=UNLOAD Dec 16 13:20:00.677000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.677000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffcfd75840 a2=50 a3=7fffcfd75920 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.687000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.687000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcfd75780 a2=28 a3=0 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.687000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.687000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcfd757b0 a2=28 a3=0 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.687000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.687000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcfd756c0 a2=28 a3=0 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.687000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.687000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcfd757d0 a2=28 a3=0 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.687000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.687000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcfd757b0 a2=28 a3=0 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.687000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.687000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcfd757a0 a2=28 a3=0 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.687000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.687000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcfd757d0 a2=28 a3=0 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.687000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.687000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcfd757b0 a2=28 a3=0 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.687000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.687000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcfd757d0 a2=28 a3=0 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.687000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.687000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcfd757a0 a2=28 a3=0 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcfd75810 a2=28 a3=0 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffcfd755c0 a2=50 a3=1 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit: BPF prog-id=79 op=LOAD Dec 16 13:20:00.688000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffcfd755c0 a2=94 a3=5 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.688000 audit: BPF prog-id=79 op=UNLOAD Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffcfd75670 a2=50 a3=1 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffcfd75790 a2=4 a3=38 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.688000 audit[2290]: AVC avc: denied { confidentiality } for pid=2290 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:00.688000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcfd757e0 a2=94 a3=6 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { confidentiality } for pid=2290 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:00.689000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcfd74f90 a2=94 a3=83 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.689000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.689000 audit[2290]: AVC avc: denied { confidentiality } for pid=2290 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:00.689000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcfd74f90 a2=94 a3=83 items=0 ppid=2159 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.689000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:20:00.700000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.700000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.700000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.700000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.700000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.700000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.700000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.700000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.700000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.700000 audit: BPF prog-id=80 op=LOAD Dec 16 13:20:00.700000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb08dd420 a2=98 a3=1999999999999999 items=0 ppid=2159 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.700000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 16 13:20:00.701000 audit: BPF prog-id=80 op=UNLOAD Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit: BPF prog-id=81 op=LOAD Dec 16 13:20:00.701000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb08dd300 a2=74 a3=ffff items=0 ppid=2159 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.701000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 16 13:20:00.701000 audit: BPF prog-id=81 op=UNLOAD Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.701000 audit: BPF prog-id=82 op=LOAD Dec 16 13:20:00.701000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb08dd340 a2=40 a3=7ffcb08dd520 items=0 ppid=2159 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.701000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 16 13:20:00.702000 audit: BPF prog-id=82 op=UNLOAD Dec 16 13:20:00.797101 systemd-networkd[1008]: vxlan.calico: Link UP Dec 16 13:20:00.797109 systemd-networkd[1008]: vxlan.calico: Gained carrier Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit: BPF prog-id=83 op=LOAD Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc770525e0 a2=98 a3=ffffffff items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit: BPF prog-id=83 op=UNLOAD Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit: BPF prog-id=84 op=LOAD Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc770523f0 a2=74 a3=540051 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit: BPF prog-id=84 op=UNLOAD Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit: BPF prog-id=85 op=LOAD Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc77052420 a2=94 a3=2 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit: BPF prog-id=85 op=UNLOAD Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc770522f0 a2=28 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc77052320 a2=28 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc77052230 a2=28 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc77052340 a2=28 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc77052320 a2=28 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc77052310 a2=28 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc77052340 a2=28 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc77052320 a2=28 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc77052340 a2=28 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc77052310 a2=28 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc77052380 a2=28 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.827000 audit: BPF prog-id=86 op=LOAD Dec 16 13:20:00.827000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc770521f0 a2=40 a3=0 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.827000 audit: BPF prog-id=86 op=UNLOAD Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc770521e0 a2=50 a3=2800 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc770521e0 a2=50 a3=2800 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit: BPF prog-id=87 op=LOAD Dec 16 13:20:00.832000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc77051a00 a2=94 a3=2 items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.832000 audit: BPF prog-id=87 op=UNLOAD Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.832000 audit: BPF prog-id=88 op=LOAD Dec 16 13:20:00.832000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc77051b00 a2=94 a3=2d items=0 ppid=2159 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:20:00.841000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.841000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.841000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.841000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.841000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.841000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.841000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.841000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.841000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.841000 audit: BPF prog-id=89 op=LOAD Dec 16 13:20:00.841000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7c856c40 a2=98 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.841000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.842000 audit: BPF prog-id=89 op=UNLOAD Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit: BPF prog-id=90 op=LOAD Dec 16 13:20:00.842000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7c856a20 a2=74 a3=540051 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.842000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.842000 audit: BPF prog-id=90 op=UNLOAD Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.842000 audit: BPF prog-id=91 op=LOAD Dec 16 13:20:00.842000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7c856a50 a2=94 a3=2 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.842000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.842000 audit: BPF prog-id=91 op=UNLOAD Dec 16 13:20:00.972000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.972000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.972000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.972000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.972000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.972000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.972000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.972000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.972000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.972000 audit: BPF prog-id=92 op=LOAD Dec 16 13:20:00.972000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7c856910 a2=40 a3=1 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.972000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.973000 audit: BPF prog-id=92 op=UNLOAD Dec 16 13:20:00.973000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.973000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff7c8569e0 a2=50 a3=7fff7c856ac0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.985000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.985000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7c856920 a2=28 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.985000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.985000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.985000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c856950 a2=28 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.985000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.986000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.986000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c856860 a2=28 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.986000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.986000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7c856970 a2=28 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.986000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.986000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7c856950 a2=28 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.986000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.986000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7c856940 a2=28 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.986000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.986000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7c856970 a2=28 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.986000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.986000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c856950 a2=28 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.987000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.987000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c856970 a2=28 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.987000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.987000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c856940 a2=28 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.987000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.987000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7c8569b0 a2=28 a3=0 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.987000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.987000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7c856760 a2=50 a3=1 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.988000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.988000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.988000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.988000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.988000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.988000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.988000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.988000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.988000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.988000 audit: BPF prog-id=93 op=LOAD Dec 16 13:20:00.988000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7c856760 a2=94 a3=5 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.989000 audit: BPF prog-id=93 op=UNLOAD Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7c856810 a2=50 a3=1 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff7c856930 a2=4 a3=38 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.989000 audit[2323]: AVC avc: denied { confidentiality } for pid=2323 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:00.989000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7c856980 a2=94 a3=6 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.990000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.990000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.990000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.990000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.990000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.990000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.990000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.990000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.990000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.990000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.990000 audit[2323]: AVC avc: denied { confidentiality } for pid=2323 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:00.990000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7c856130 a2=94 a3=83 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.991000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.991000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.991000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.991000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.991000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.991000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.991000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.991000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.991000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.991000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.991000 audit[2323]: AVC avc: denied { confidentiality } for pid=2323 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:00.991000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7c856130 a2=94 a3=83 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.991000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.992000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.992000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff7c857b70 a2=10 a3=f1f00800 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.992000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.993000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.993000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff7c857a10 a2=10 a3=3 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.993000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.993000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff7c8579b0 a2=10 a3=3 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:00.993000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:00.993000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff7c8579b0 a2=10 a3=7 items=0 ppid=2159 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:00.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:20:01.000000 audit: BPF prog-id=88 op=UNLOAD Dec 16 13:20:01.018748 kubelet[1438]: E1216 13:20:01.018671 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:01.082000 audit[2348]: NETFILTER_CFG table=mangle:81 family=2 entries=16 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:20:01.082000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffa9ea0470 a2=0 a3=7fffa9ea045c items=0 ppid=2159 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:01.082000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:20:01.099000 audit[2347]: NETFILTER_CFG table=nat:82 family=2 entries=15 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:20:01.099000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd5a3ceb90 a2=0 a3=7ffd5a3ceb7c items=0 ppid=2159 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:01.099000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:20:01.101000 audit[2350]: NETFILTER_CFG table=filter:83 family=2 entries=39 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:20:01.101000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd755a7110 a2=0 a3=7ffd755a70fc items=0 ppid=2159 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:01.101000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:20:01.105000 audit[2346]: NETFILTER_CFG table=raw:84 family=2 entries=21 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:20:01.105000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe6a930300 a2=0 a3=7ffe6a9302ec items=0 ppid=2159 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:01.105000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:20:01.282239 kubelet[1438]: E1216 13:20:01.279546 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:20:01.313802 systemd[1]: run-containerd-runc-k8s.io-e0cd00f502617fe903f92f6b01990461a33a5639a6c5032af603d90863d1d7e4-runc.OqrCbE.mount: Deactivated successfully. Dec 16 13:20:02.020023 kubelet[1438]: E1216 13:20:02.019938 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:02.196367 systemd-networkd[1008]: vxlan.calico: Gained IPv6LL Dec 16 13:20:03.020929 kubelet[1438]: E1216 13:20:03.020873 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:04.022600 kubelet[1438]: E1216 13:20:04.022525 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:05.023867 kubelet[1438]: E1216 13:20:05.023770 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:05.213780 env[1192]: time="2024-12-16T13:20:05.213679859Z" level=info msg="StopPodSandbox for \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\"" Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.328 [INFO][2394] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.329 [INFO][2394] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" iface="eth0" netns="/var/run/netns/cni-a093d721-79f1-b2c4-3f9c-83a37f0bd798" Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.330 [INFO][2394] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" iface="eth0" netns="/var/run/netns/cni-a093d721-79f1-b2c4-3f9c-83a37f0bd798" Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.333 [INFO][2394] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" iface="eth0" netns="/var/run/netns/cni-a093d721-79f1-b2c4-3f9c-83a37f0bd798" Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.333 [INFO][2394] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.333 [INFO][2394] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.423 [INFO][2400] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" HandleID="k8s-pod-network.6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.423 [INFO][2400] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.423 [INFO][2400] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.437 [WARNING][2400] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" HandleID="k8s-pod-network.6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.437 [INFO][2400] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" HandleID="k8s-pod-network.6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.440 [INFO][2400] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:20:05.446870 env[1192]: 2024-12-16 13:20:05.444 [INFO][2394] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:05.452529 env[1192]: time="2024-12-16T13:20:05.447873441Z" level=info msg="TearDown network for sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\" successfully" Dec 16 13:20:05.452529 env[1192]: time="2024-12-16T13:20:05.447929073Z" level=info msg="StopPodSandbox for \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\" returns successfully" Dec 16 13:20:05.451065 systemd[1]: run-netns-cni\x2da093d721\x2d79f1\x2db2c4\x2d3f9c\x2d83a37f0bd798.mount: Deactivated successfully. Dec 16 13:20:05.453511 env[1192]: time="2024-12-16T13:20:05.453453392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bw68p,Uid:0d56ae2d-4bfb-4820-982c-56c604fe9994,Namespace:calico-system,Attempt:1,}" Dec 16 13:20:05.698134 systemd-networkd[1008]: cali749d0df73a2: Link UP Dec 16 13:20:05.703957 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 16 13:20:05.704174 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali749d0df73a2: link becomes ready Dec 16 13:20:05.704491 systemd-networkd[1008]: cali749d0df73a2: Gained carrier Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.557 [INFO][2407] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.170.252-k8s-csi--node--driver--bw68p-eth0 csi-node-driver- calico-system 0d56ae2d-4bfb-4820-982c-56c604fe9994 1109 0 2024-12-16 13:19:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 146.190.170.252 csi-node-driver-bw68p eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali749d0df73a2 [] []}} ContainerID="0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" Namespace="calico-system" Pod="csi-node-driver-bw68p" WorkloadEndpoint="146.190.170.252-k8s-csi--node--driver--bw68p-" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.558 [INFO][2407] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" Namespace="calico-system" Pod="csi-node-driver-bw68p" WorkloadEndpoint="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.615 [INFO][2419] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" HandleID="k8s-pod-network.0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.635 [INFO][2419] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" HandleID="k8s-pod-network.0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ed490), Attrs:map[string]string{"namespace":"calico-system", "node":"146.190.170.252", "pod":"csi-node-driver-bw68p", "timestamp":"2024-12-16 13:20:05.615709099 +0000 UTC"}, Hostname:"146.190.170.252", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.635 [INFO][2419] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.636 [INFO][2419] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.636 [INFO][2419] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.170.252' Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.640 [INFO][2419] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" host="146.190.170.252" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.650 [INFO][2419] ipam/ipam.go 372: Looking up existing affinities for host host="146.190.170.252" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.659 [INFO][2419] ipam/ipam.go 489: Trying affinity for 192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.663 [INFO][2419] ipam/ipam.go 155: Attempting to load block cidr=192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.668 [INFO][2419] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.668 [INFO][2419] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.64/26 handle="k8s-pod-network.0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" host="146.190.170.252" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.672 [INFO][2419] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812 Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.678 [INFO][2419] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.33.64/26 handle="k8s-pod-network.0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" host="146.190.170.252" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.690 [INFO][2419] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.33.65/26] block=192.168.33.64/26 handle="k8s-pod-network.0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" host="146.190.170.252" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.690 [INFO][2419] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.65/26] handle="k8s-pod-network.0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" host="146.190.170.252" Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.690 [INFO][2419] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:20:05.747939 env[1192]: 2024-12-16 13:20:05.690 [INFO][2419] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.33.65/26] IPv6=[] ContainerID="0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" HandleID="k8s-pod-network.0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:05.749302 env[1192]: 2024-12-16 13:20:05.693 [INFO][2407] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" Namespace="calico-system" Pod="csi-node-driver-bw68p" WorkloadEndpoint="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-csi--node--driver--bw68p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0d56ae2d-4bfb-4820-982c-56c604fe9994", ResourceVersion:"1109", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"", Pod:"csi-node-driver-bw68p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.33.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali749d0df73a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:05.749302 env[1192]: 2024-12-16 13:20:05.693 [INFO][2407] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.33.65/32] ContainerID="0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" Namespace="calico-system" Pod="csi-node-driver-bw68p" WorkloadEndpoint="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:05.749302 env[1192]: 2024-12-16 13:20:05.693 [INFO][2407] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali749d0df73a2 ContainerID="0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" Namespace="calico-system" Pod="csi-node-driver-bw68p" WorkloadEndpoint="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:05.749302 env[1192]: 2024-12-16 13:20:05.705 [INFO][2407] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" Namespace="calico-system" Pod="csi-node-driver-bw68p" WorkloadEndpoint="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:05.749302 env[1192]: 2024-12-16 13:20:05.707 [INFO][2407] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" Namespace="calico-system" Pod="csi-node-driver-bw68p" WorkloadEndpoint="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-csi--node--driver--bw68p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0d56ae2d-4bfb-4820-982c-56c604fe9994", ResourceVersion:"1109", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812", Pod:"csi-node-driver-bw68p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.33.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali749d0df73a2", MAC:"56:7e:23:b8:76:af", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:05.749302 env[1192]: 2024-12-16 13:20:05.722 [INFO][2407] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812" Namespace="calico-system" Pod="csi-node-driver-bw68p" WorkloadEndpoint="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:05.752745 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 16 13:20:05.752928 kernel: audit: type=1325 audit(1734355205.749:662): table=filter:85 family=2 entries=34 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:20:05.749000 audit[2431]: NETFILTER_CFG table=filter:85 family=2 entries=34 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:20:05.749000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc07cdd580 a2=0 a3=7ffc07cdd56c items=0 ppid=2159 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:05.749000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:20:05.762066 kernel: audit: type=1300 audit(1734355205.749:662): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc07cdd580 a2=0 a3=7ffc07cdd56c items=0 ppid=2159 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:05.762294 kernel: audit: type=1327 audit(1734355205.749:662): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:20:05.780561 env[1192]: time="2024-12-16T13:20:05.780436766Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:20:05.781073 env[1192]: time="2024-12-16T13:20:05.780648013Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:20:05.781073 env[1192]: time="2024-12-16T13:20:05.780685192Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:20:05.781348 env[1192]: time="2024-12-16T13:20:05.781095553Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812 pid=2448 runtime=io.containerd.runc.v2 Dec 16 13:20:05.811293 systemd[1]: Started cri-containerd-0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812.scope. Dec 16 13:20:05.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852045 kernel: audit: type=1400 audit(1734355205.844:663): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852272 kernel: audit: type=1400 audit(1734355205.844:664): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.863044 kernel: audit: type=1400 audit(1734355205.844:665): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.863267 kernel: audit: type=1400 audit(1734355205.844:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.863316 kernel: audit: type=1400 audit(1734355205.844:667): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.870243 kernel: audit: type=1400 audit(1734355205.844:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.870416 kernel: audit: type=1400 audit(1734355205.844:669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.851000 audit: BPF prog-id=94 op=LOAD Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:05.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333565333531323438643733353332393032633835633330616237 Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:05.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333565333531323438643733353332393032633835633330616237 Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.852000 audit: BPF prog-id=95 op=LOAD Dec 16 13:20:05.852000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024fb0 items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:05.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333565333531323438643733353332393032633835633330616237 Dec 16 13:20:05.862000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.862000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.862000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.862000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.862000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.862000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.862000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.862000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.862000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.862000 audit: BPF prog-id=96 op=LOAD Dec 16 13:20:05.862000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024ff8 items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:05.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333565333531323438643733353332393032633835633330616237 Dec 16 13:20:05.866000 audit: BPF prog-id=96 op=UNLOAD Dec 16 13:20:05.866000 audit: BPF prog-id=95 op=UNLOAD Dec 16 13:20:05.866000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.866000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.866000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.866000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.866000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.866000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.866000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.866000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.866000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.866000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:05.866000 audit: BPF prog-id=97 op=LOAD Dec 16 13:20:05.866000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025408 items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:05.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333565333531323438643733353332393032633835633330616237 Dec 16 13:20:05.896735 env[1192]: time="2024-12-16T13:20:05.896639220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bw68p,Uid:0d56ae2d-4bfb-4820-982c-56c604fe9994,Namespace:calico-system,Attempt:1,} returns sandbox id \"0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812\"" Dec 16 13:20:05.900220 env[1192]: time="2024-12-16T13:20:05.899910127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 16 13:20:06.024853 kubelet[1438]: E1216 13:20:06.024769 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:06.451475 systemd[1]: run-containerd-runc-k8s.io-0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812-runc.NAMMo4.mount: Deactivated successfully. Dec 16 13:20:07.025044 kubelet[1438]: E1216 13:20:07.024958 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:07.213722 env[1192]: time="2024-12-16T13:20:07.213665499Z" level=info msg="StopPodSandbox for \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\"" Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.321 [INFO][2501] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.321 [INFO][2501] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" iface="eth0" netns="/var/run/netns/cni-5f08885d-8633-3031-8c3a-028b42323162" Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.321 [INFO][2501] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" iface="eth0" netns="/var/run/netns/cni-5f08885d-8633-3031-8c3a-028b42323162" Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.322 [INFO][2501] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" iface="eth0" netns="/var/run/netns/cni-5f08885d-8633-3031-8c3a-028b42323162" Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.322 [INFO][2501] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.322 [INFO][2501] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.354 [INFO][2507] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" HandleID="k8s-pod-network.4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.354 [INFO][2507] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.354 [INFO][2507] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.363 [WARNING][2507] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" HandleID="k8s-pod-network.4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.363 [INFO][2507] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" HandleID="k8s-pod-network.4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.366 [INFO][2507] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:20:07.375386 env[1192]: 2024-12-16 13:20:07.368 [INFO][2501] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:07.374097 systemd[1]: run-netns-cni\x2d5f08885d\x2d8633\x2d3031\x2d8c3a\x2d028b42323162.mount: Deactivated successfully. Dec 16 13:20:07.376440 env[1192]: time="2024-12-16T13:20:07.375735038Z" level=info msg="TearDown network for sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\" successfully" Dec 16 13:20:07.376440 env[1192]: time="2024-12-16T13:20:07.375803271Z" level=info msg="StopPodSandbox for \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\" returns successfully" Dec 16 13:20:07.377220 env[1192]: time="2024-12-16T13:20:07.377102025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-zc8n2,Uid:43382018-3d8f-40b1-9383-fcc5b1997629,Namespace:default,Attempt:1,}" Dec 16 13:20:07.571629 systemd-networkd[1008]: cali749d0df73a2: Gained IPv6LL Dec 16 13:20:07.642549 systemd-networkd[1008]: calib6cbdef3ffe: Link UP Dec 16 13:20:07.646017 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 16 13:20:07.646949 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib6cbdef3ffe: link becomes ready Dec 16 13:20:07.646479 systemd-networkd[1008]: calib6cbdef3ffe: Gained carrier Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.491 [INFO][2514] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0 nginx-deployment-8587fbcb89- default 43382018-3d8f-40b1-9383-fcc5b1997629 1119 0 2024-12-16 13:19:51 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 146.190.170.252 nginx-deployment-8587fbcb89-zc8n2 eth0 default [] [] [kns.default ksa.default.default] calib6cbdef3ffe [] []}} ContainerID="4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-zc8n2" WorkloadEndpoint="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.492 [INFO][2514] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-zc8n2" WorkloadEndpoint="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.549 [INFO][2526] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" HandleID="k8s-pod-network.4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.578 [INFO][2526] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" HandleID="k8s-pod-network.4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000313930), Attrs:map[string]string{"namespace":"default", "node":"146.190.170.252", "pod":"nginx-deployment-8587fbcb89-zc8n2", "timestamp":"2024-12-16 13:20:07.549081169 +0000 UTC"}, Hostname:"146.190.170.252", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.579 [INFO][2526] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.579 [INFO][2526] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.579 [INFO][2526] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.170.252' Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.585 [INFO][2526] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" host="146.190.170.252" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.594 [INFO][2526] ipam/ipam.go 372: Looking up existing affinities for host host="146.190.170.252" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.604 [INFO][2526] ipam/ipam.go 489: Trying affinity for 192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.608 [INFO][2526] ipam/ipam.go 155: Attempting to load block cidr=192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.613 [INFO][2526] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.613 [INFO][2526] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.64/26 handle="k8s-pod-network.4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" host="146.190.170.252" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.617 [INFO][2526] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0 Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.624 [INFO][2526] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.33.64/26 handle="k8s-pod-network.4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" host="146.190.170.252" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.635 [INFO][2526] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.33.66/26] block=192.168.33.64/26 handle="k8s-pod-network.4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" host="146.190.170.252" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.635 [INFO][2526] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.66/26] handle="k8s-pod-network.4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" host="146.190.170.252" Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.635 [INFO][2526] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:20:07.672050 env[1192]: 2024-12-16 13:20:07.635 [INFO][2526] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.33.66/26] IPv6=[] ContainerID="4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" HandleID="k8s-pod-network.4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:07.672902 env[1192]: 2024-12-16 13:20:07.639 [INFO][2514] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-zc8n2" WorkloadEndpoint="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"43382018-3d8f-40b1-9383-fcc5b1997629", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-zc8n2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib6cbdef3ffe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:07.672902 env[1192]: 2024-12-16 13:20:07.639 [INFO][2514] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.33.66/32] ContainerID="4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-zc8n2" WorkloadEndpoint="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:07.672902 env[1192]: 2024-12-16 13:20:07.639 [INFO][2514] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib6cbdef3ffe ContainerID="4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-zc8n2" WorkloadEndpoint="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:07.672902 env[1192]: 2024-12-16 13:20:07.648 [INFO][2514] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-zc8n2" WorkloadEndpoint="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:07.672902 env[1192]: 2024-12-16 13:20:07.656 [INFO][2514] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-zc8n2" WorkloadEndpoint="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"43382018-3d8f-40b1-9383-fcc5b1997629", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0", Pod:"nginx-deployment-8587fbcb89-zc8n2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib6cbdef3ffe", MAC:"0e:af:3f:bb:f1:e1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:07.672902 env[1192]: 2024-12-16 13:20:07.667 [INFO][2514] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-zc8n2" WorkloadEndpoint="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:07.690000 audit[2546]: NETFILTER_CFG table=filter:86 family=2 entries=38 op=nft_register_chain pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:20:07.690000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe7268f510 a2=0 a3=7ffe7268f4fc items=0 ppid=2159 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:07.690000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:20:07.707752 env[1192]: time="2024-12-16T13:20:07.707476908Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:20:07.707752 env[1192]: time="2024-12-16T13:20:07.707541146Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:20:07.707752 env[1192]: time="2024-12-16T13:20:07.707560854Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:20:07.708266 env[1192]: time="2024-12-16T13:20:07.708164555Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0 pid=2555 runtime=io.containerd.runc.v2 Dec 16 13:20:07.740213 systemd[1]: Started cri-containerd-4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0.scope. Dec 16 13:20:07.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.770000 audit: BPF prog-id=98 op=LOAD Dec 16 13:20:07.771000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.771000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2555 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:07.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462356339646132316236333062663065343430363131383466653663 Dec 16 13:20:07.771000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.771000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2555 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:07.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462356339646132316236333062663065343430363131383466653663 Dec 16 13:20:07.772000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.772000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.772000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.772000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.772000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.772000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.772000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.772000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.772000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.772000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.772000 audit: BPF prog-id=99 op=LOAD Dec 16 13:20:07.772000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000309d40 items=0 ppid=2555 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:07.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462356339646132316236333062663065343430363131383466653663 Dec 16 13:20:07.773000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.773000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.773000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.773000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.773000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.773000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.773000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.773000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.773000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.773000 audit: BPF prog-id=100 op=LOAD Dec 16 13:20:07.773000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000309d88 items=0 ppid=2555 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:07.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462356339646132316236333062663065343430363131383466653663 Dec 16 13:20:07.773000 audit: BPF prog-id=100 op=UNLOAD Dec 16 13:20:07.774000 audit: BPF prog-id=99 op=UNLOAD Dec 16 13:20:07.774000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.774000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.774000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.774000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.774000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.774000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.774000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.774000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.774000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.774000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:07.774000 audit: BPF prog-id=101 op=LOAD Dec 16 13:20:07.774000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037a198 items=0 ppid=2555 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:07.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462356339646132316236333062663065343430363131383466653663 Dec 16 13:20:07.827061 env[1192]: time="2024-12-16T13:20:07.827004406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-zc8n2,Uid:43382018-3d8f-40b1-9383-fcc5b1997629,Namespace:default,Attempt:1,} returns sandbox id \"4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0\"" Dec 16 13:20:08.025152 kubelet[1438]: E1216 13:20:08.025092 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:08.511106 env[1192]: time="2024-12-16T13:20:08.511001525Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:08.514278 env[1192]: time="2024-12-16T13:20:08.514216229Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:08.517812 env[1192]: time="2024-12-16T13:20:08.517734820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:08.523756 env[1192]: time="2024-12-16T13:20:08.523686612Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:08.524801 env[1192]: time="2024-12-16T13:20:08.524743521Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 16 13:20:08.528804 env[1192]: time="2024-12-16T13:20:08.528761962Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 16 13:20:08.530073 env[1192]: time="2024-12-16T13:20:08.529906977Z" level=info msg="CreateContainer within sandbox \"0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 16 13:20:08.570607 env[1192]: time="2024-12-16T13:20:08.570481911Z" level=info msg="CreateContainer within sandbox \"0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"14b0fa0ff1616913228b19474e6b1a58ee5154c77d9b906b86b6dbbe43371d51\"" Dec 16 13:20:08.572055 env[1192]: time="2024-12-16T13:20:08.572001817Z" level=info msg="StartContainer for \"14b0fa0ff1616913228b19474e6b1a58ee5154c77d9b906b86b6dbbe43371d51\"" Dec 16 13:20:08.607240 systemd[1]: Started cri-containerd-14b0fa0ff1616913228b19474e6b1a58ee5154c77d9b906b86b6dbbe43371d51.scope. Dec 16 13:20:08.634000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.634000 audit[2597]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fed3993b2f8 items=0 ppid=2448 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:08.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134623066613066663136313639313332323862313934373465366231 Dec 16 13:20:08.634000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.634000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.634000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.634000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.634000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.634000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.634000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.634000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.634000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.634000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.634000 audit: BPF prog-id=102 op=LOAD Dec 16 13:20:08.634000 audit[2597]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024af8 items=0 ppid=2448 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:08.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134623066613066663136313639313332323862313934373465366231 Dec 16 13:20:08.636000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.636000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.636000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.636000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.636000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.636000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.636000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.636000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.636000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.636000 audit: BPF prog-id=103 op=LOAD Dec 16 13:20:08.636000 audit[2597]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024b48 items=0 ppid=2448 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:08.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134623066613066663136313639313332323862313934373465366231 Dec 16 13:20:08.637000 audit: BPF prog-id=103 op=UNLOAD Dec 16 13:20:08.637000 audit: BPF prog-id=102 op=UNLOAD Dec 16 13:20:08.637000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.637000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.637000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.637000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.637000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.637000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.637000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.637000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.637000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.637000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:08.637000 audit: BPF prog-id=104 op=LOAD Dec 16 13:20:08.637000 audit[2597]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024bd8 items=0 ppid=2448 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:08.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134623066613066663136313639313332323862313934373465366231 Dec 16 13:20:08.666277 env[1192]: time="2024-12-16T13:20:08.666218497Z" level=info msg="StartContainer for \"14b0fa0ff1616913228b19474e6b1a58ee5154c77d9b906b86b6dbbe43371d51\" returns successfully" Dec 16 13:20:09.026974 kubelet[1438]: E1216 13:20:09.026535 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:09.555949 systemd-networkd[1008]: calib6cbdef3ffe: Gained IPv6LL Dec 16 13:20:10.027345 kubelet[1438]: E1216 13:20:10.027104 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:11.028091 kubelet[1438]: E1216 13:20:11.028023 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:12.028688 kubelet[1438]: E1216 13:20:12.028611 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:12.236100 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1610450105.mount: Deactivated successfully. Dec 16 13:20:13.029522 kubelet[1438]: E1216 13:20:13.029447 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:14.029828 kubelet[1438]: E1216 13:20:14.029769 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:14.048960 env[1192]: time="2024-12-16T13:20:14.048879117Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:14.050807 env[1192]: time="2024-12-16T13:20:14.050751945Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:14.053496 env[1192]: time="2024-12-16T13:20:14.053438101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:14.058623 env[1192]: time="2024-12-16T13:20:14.058562997Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:14.059149 env[1192]: time="2024-12-16T13:20:14.059091956Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 16 13:20:14.062630 env[1192]: time="2024-12-16T13:20:14.062581512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 16 13:20:14.064389 env[1192]: time="2024-12-16T13:20:14.064332988Z" level=info msg="CreateContainer within sandbox \"4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 16 13:20:14.084482 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3565881763.mount: Deactivated successfully. Dec 16 13:20:14.093760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2748103212.mount: Deactivated successfully. Dec 16 13:20:14.100068 env[1192]: time="2024-12-16T13:20:14.099946068Z" level=info msg="CreateContainer within sandbox \"4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"96561d653d4c31544f6f1a625d23a18bd85d19756120ded73d00cfdfcfc660a4\"" Dec 16 13:20:14.101250 env[1192]: time="2024-12-16T13:20:14.101173779Z" level=info msg="StartContainer for \"96561d653d4c31544f6f1a625d23a18bd85d19756120ded73d00cfdfcfc660a4\"" Dec 16 13:20:14.138774 systemd[1]: Started cri-containerd-96561d653d4c31544f6f1a625d23a18bd85d19756120ded73d00cfdfcfc660a4.scope. Dec 16 13:20:14.165007 kernel: kauditd_printk_skb: 153 callbacks suppressed Dec 16 13:20:14.165207 kernel: audit: type=1400 audit(1734355214.160:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.165247 kernel: audit: type=1400 audit(1734355214.160:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.170341 kernel: audit: type=1400 audit(1734355214.160:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.170469 kernel: audit: type=1400 audit(1734355214.160:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.173522 kernel: audit: type=1400 audit(1734355214.160:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.178452 kernel: audit: type=1400 audit(1734355214.160:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.178607 kernel: audit: type=1400 audit(1734355214.160:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.181286 kernel: audit: type=1400 audit(1734355214.160:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.187941 kernel: audit: type=1400 audit(1734355214.160:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.188136 kernel: audit: type=1400 audit(1734355214.166:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.166000 audit: BPF prog-id=105 op=LOAD Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2555 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:14.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353631643635336434633331353434663666316136323564323361 Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2555 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:14.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353631643635336434633331353434663666316136323564323361 Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.167000 audit: BPF prog-id=106 op=LOAD Dec 16 13:20:14.167000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000337d40 items=0 ppid=2555 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:14.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353631643635336434633331353434663666316136323564323361 Dec 16 13:20:14.172000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.172000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.172000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.172000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.172000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.172000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.172000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.172000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.172000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.172000 audit: BPF prog-id=107 op=LOAD Dec 16 13:20:14.172000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000337d88 items=0 ppid=2555 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:14.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353631643635336434633331353434663666316136323564323361 Dec 16 13:20:14.180000 audit: BPF prog-id=107 op=UNLOAD Dec 16 13:20:14.180000 audit: BPF prog-id=106 op=UNLOAD Dec 16 13:20:14.180000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.180000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.180000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.180000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.180000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.180000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.180000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.180000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.180000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.180000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:14.180000 audit: BPF prog-id=108 op=LOAD Dec 16 13:20:14.180000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000394198 items=0 ppid=2555 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:14.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353631643635336434633331353434663666316136323564323361 Dec 16 13:20:14.226085 env[1192]: time="2024-12-16T13:20:14.225966604Z" level=info msg="StartContainer for \"96561d653d4c31544f6f1a625d23a18bd85d19756120ded73d00cfdfcfc660a4\" returns successfully" Dec 16 13:20:15.030768 kubelet[1438]: E1216 13:20:15.030706 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:15.919173 env[1192]: time="2024-12-16T13:20:15.919085263Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:15.921944 env[1192]: time="2024-12-16T13:20:15.921890313Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:15.924580 env[1192]: time="2024-12-16T13:20:15.924524514Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:15.926385 env[1192]: time="2024-12-16T13:20:15.926331360Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:15.927184 env[1192]: time="2024-12-16T13:20:15.927142735Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 16 13:20:15.931004 env[1192]: time="2024-12-16T13:20:15.930952201Z" level=info msg="CreateContainer within sandbox \"0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 16 13:20:15.950544 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1213699246.mount: Deactivated successfully. Dec 16 13:20:15.960841 env[1192]: time="2024-12-16T13:20:15.960732890Z" level=info msg="CreateContainer within sandbox \"0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"72b6f12dd3acb3711e7ab26b451d198381bdbbaffdece6ea53d25af0f506430d\"" Dec 16 13:20:15.961929 env[1192]: time="2024-12-16T13:20:15.961878723Z" level=info msg="StartContainer for \"72b6f12dd3acb3711e7ab26b451d198381bdbbaffdece6ea53d25af0f506430d\"" Dec 16 13:20:15.999221 systemd[1]: Started cri-containerd-72b6f12dd3acb3711e7ab26b451d198381bdbbaffdece6ea53d25af0f506430d.scope. Dec 16 13:20:16.025000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.025000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f3138a217c8 items=0 ppid=2448 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:16.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732623666313264643361636233373131653761623236623435316431 Dec 16 13:20:16.026000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.026000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.026000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.026000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.026000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.026000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.026000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.026000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.026000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.026000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.026000 audit: BPF prog-id=109 op=LOAD Dec 16 13:20:16.026000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003584f8 items=0 ppid=2448 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:16.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732623666313264643361636233373131653761623236623435316431 Dec 16 13:20:16.027000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.027000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.027000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.027000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.027000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.027000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.027000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.027000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.027000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.027000 audit: BPF prog-id=110 op=LOAD Dec 16 13:20:16.027000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000358548 items=0 ppid=2448 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:16.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732623666313264643361636233373131653761623236623435316431 Dec 16 13:20:16.028000 audit: BPF prog-id=110 op=UNLOAD Dec 16 13:20:16.028000 audit: BPF prog-id=109 op=UNLOAD Dec 16 13:20:16.028000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.028000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.028000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.028000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.028000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.028000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.028000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.028000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.028000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.028000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:16.028000 audit: BPF prog-id=111 op=LOAD Dec 16 13:20:16.028000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003585d8 items=0 ppid=2448 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:16.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732623666313264643361636233373131653761623236623435316431 Dec 16 13:20:16.031887 kubelet[1438]: E1216 13:20:16.031782 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:16.078988 env[1192]: time="2024-12-16T13:20:16.078904726Z" level=info msg="StartContainer for \"72b6f12dd3acb3711e7ab26b451d198381bdbbaffdece6ea53d25af0f506430d\" returns successfully" Dec 16 13:20:16.079683 systemd[1]: run-containerd-runc-k8s.io-72b6f12dd3acb3711e7ab26b451d198381bdbbaffdece6ea53d25af0f506430d-runc.q25Sr3.mount: Deactivated successfully. Dec 16 13:20:16.148812 kubelet[1438]: I1216 13:20:16.148703 1438 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 16 13:20:16.148812 kubelet[1438]: I1216 13:20:16.148754 1438 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 16 13:20:16.344714 kubelet[1438]: I1216 13:20:16.344602 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-bw68p" podStartSLOduration=28.315136265 podStartE2EDuration="38.344573589s" podCreationTimestamp="2024-12-16 13:19:38 +0000 UTC" firstStartedPulling="2024-12-16 13:20:05.899456235 +0000 UTC m=+28.460489320" lastFinishedPulling="2024-12-16 13:20:15.928893555 +0000 UTC m=+38.489926644" observedRunningTime="2024-12-16 13:20:16.344524146 +0000 UTC m=+38.905557245" watchObservedRunningTime="2024-12-16 13:20:16.344573589 +0000 UTC m=+38.905606674" Dec 16 13:20:16.345330 kubelet[1438]: I1216 13:20:16.345288 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-zc8n2" podStartSLOduration=19.113323645 podStartE2EDuration="25.345259991s" podCreationTimestamp="2024-12-16 13:19:51 +0000 UTC" firstStartedPulling="2024-12-16 13:20:07.829782018 +0000 UTC m=+30.390815107" lastFinishedPulling="2024-12-16 13:20:14.061718363 +0000 UTC m=+36.622751453" observedRunningTime="2024-12-16 13:20:14.333732567 +0000 UTC m=+36.894765658" watchObservedRunningTime="2024-12-16 13:20:16.345259991 +0000 UTC m=+38.906293080" Dec 16 13:20:17.032301 kubelet[1438]: E1216 13:20:17.032241 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:17.993749 kubelet[1438]: E1216 13:20:17.993679 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:18.033424 kubelet[1438]: E1216 13:20:18.033365 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:18.465817 update_engine[1183]: I1216 13:20:18.465699 1183 update_attempter.cc:509] Updating boot flags... Dec 16 13:20:19.034921 kubelet[1438]: E1216 13:20:19.034832 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:20.036087 kubelet[1438]: E1216 13:20:20.036027 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:21.037179 kubelet[1438]: E1216 13:20:21.037091 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:22.038149 kubelet[1438]: E1216 13:20:22.038056 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:23.039051 kubelet[1438]: E1216 13:20:23.038966 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:23.261179 kernel: kauditd_printk_skb: 90 callbacks suppressed Dec 16 13:20:23.261335 kernel: audit: type=1325 audit(1734355223.258:730): table=filter:87 family=2 entries=20 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.258000 audit[2753]: NETFILTER_CFG table=filter:87 family=2 entries=20 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.258000 audit[2753]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff2fbe6110 a2=0 a3=7fff2fbe60fc items=0 ppid=1726 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.268746 kernel: audit: type=1300 audit(1734355223.258:730): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff2fbe6110 a2=0 a3=7fff2fbe60fc items=0 ppid=1726 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.268924 kernel: audit: type=1327 audit(1734355223.258:730): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:23.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:23.268000 audit[2753]: NETFILTER_CFG table=nat:88 family=2 entries=22 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.284138 kernel: audit: type=1325 audit(1734355223.268:731): table=nat:88 family=2 entries=22 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.284300 kernel: audit: type=1300 audit(1734355223.268:731): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff2fbe6110 a2=0 a3=0 items=0 ppid=1726 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.268000 audit[2753]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff2fbe6110 a2=0 a3=0 items=0 ppid=1726 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.268000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:23.292071 kernel: audit: type=1327 audit(1734355223.268:731): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:23.300000 audit[2755]: NETFILTER_CFG table=filter:89 family=2 entries=32 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.305151 kernel: audit: type=1325 audit(1734355223.300:732): table=filter:89 family=2 entries=32 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.305292 kernel: audit: type=1300 audit(1734355223.300:732): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff475bfd00 a2=0 a3=7fff475bfcec items=0 ppid=1726 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.300000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff475bfd00 a2=0 a3=7fff475bfcec items=0 ppid=1726 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:23.313412 kernel: audit: type=1327 audit(1734355223.300:732): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:23.313000 audit[2755]: NETFILTER_CFG table=nat:90 family=2 entries=22 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.313000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff475bfd00 a2=0 a3=0 items=0 ppid=1726 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:23.318145 kernel: audit: type=1325 audit(1734355223.313:733): table=nat:90 family=2 entries=22 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.496461 systemd[1]: Created slice kubepods-besteffort-pod75f6181b_9337_49f6_a5f1_e9ba7b585c4a.slice. Dec 16 13:20:23.595001 kubelet[1438]: I1216 13:20:23.594344 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/75f6181b-9337-49f6-a5f1-e9ba7b585c4a-data\") pod \"nfs-server-provisioner-0\" (UID: \"75f6181b-9337-49f6-a5f1-e9ba7b585c4a\") " pod="default/nfs-server-provisioner-0" Dec 16 13:20:23.595419 kubelet[1438]: I1216 13:20:23.595377 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ls2fk\" (UniqueName: \"kubernetes.io/projected/75f6181b-9337-49f6-a5f1-e9ba7b585c4a-kube-api-access-ls2fk\") pod \"nfs-server-provisioner-0\" (UID: \"75f6181b-9337-49f6-a5f1-e9ba7b585c4a\") " pod="default/nfs-server-provisioner-0" Dec 16 13:20:23.802403 env[1192]: time="2024-12-16T13:20:23.802332671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:75f6181b-9337-49f6-a5f1-e9ba7b585c4a,Namespace:default,Attempt:0,}" Dec 16 13:20:23.996238 systemd-networkd[1008]: cali60e51b789ff: Link UP Dec 16 13:20:24.000282 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 16 13:20:24.000546 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 16 13:20:24.000526 systemd-networkd[1008]: cali60e51b789ff: Gained carrier Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.872 [INFO][2757] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.170.252-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 75f6181b-9337-49f6-a5f1-e9ba7b585c4a 1201 0 2024-12-16 13:20:23 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 146.190.170.252 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.170.252-k8s-nfs--server--provisioner--0-" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.872 [INFO][2757] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.170.252-k8s-nfs--server--provisioner--0-eth0" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.916 [INFO][2770] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" HandleID="k8s-pod-network.a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" Workload="146.190.170.252-k8s-nfs--server--provisioner--0-eth0" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.932 [INFO][2770] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" HandleID="k8s-pod-network.a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" Workload="146.190.170.252-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9650), Attrs:map[string]string{"namespace":"default", "node":"146.190.170.252", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-16 13:20:23.916594334 +0000 UTC"}, Hostname:"146.190.170.252", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.932 [INFO][2770] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.932 [INFO][2770] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.932 [INFO][2770] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.170.252' Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.936 [INFO][2770] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" host="146.190.170.252" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.942 [INFO][2770] ipam/ipam.go 372: Looking up existing affinities for host host="146.190.170.252" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.950 [INFO][2770] ipam/ipam.go 489: Trying affinity for 192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.953 [INFO][2770] ipam/ipam.go 155: Attempting to load block cidr=192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.957 [INFO][2770] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.957 [INFO][2770] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.64/26 handle="k8s-pod-network.a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" host="146.190.170.252" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.960 [INFO][2770] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658 Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.968 [INFO][2770] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.33.64/26 handle="k8s-pod-network.a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" host="146.190.170.252" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.978 [INFO][2770] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.33.67/26] block=192.168.33.64/26 handle="k8s-pod-network.a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" host="146.190.170.252" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.978 [INFO][2770] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.67/26] handle="k8s-pod-network.a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" host="146.190.170.252" Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.979 [INFO][2770] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:20:24.016256 env[1192]: 2024-12-16 13:20:23.979 [INFO][2770] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.33.67/26] IPv6=[] ContainerID="a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" HandleID="k8s-pod-network.a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" Workload="146.190.170.252-k8s-nfs--server--provisioner--0-eth0" Dec 16 13:20:24.017178 env[1192]: 2024-12-16 13:20:23.980 [INFO][2757] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.170.252-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"75f6181b-9337-49f6-a5f1-e9ba7b585c4a", ResourceVersion:"1201", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 20, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.33.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:24.017178 env[1192]: 2024-12-16 13:20:23.981 [INFO][2757] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.33.67/32] ContainerID="a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.170.252-k8s-nfs--server--provisioner--0-eth0" Dec 16 13:20:24.017178 env[1192]: 2024-12-16 13:20:23.981 [INFO][2757] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.170.252-k8s-nfs--server--provisioner--0-eth0" Dec 16 13:20:24.017178 env[1192]: 2024-12-16 13:20:24.001 [INFO][2757] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.170.252-k8s-nfs--server--provisioner--0-eth0" Dec 16 13:20:24.017377 env[1192]: 2024-12-16 13:20:24.002 [INFO][2757] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.170.252-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"75f6181b-9337-49f6-a5f1-e9ba7b585c4a", ResourceVersion:"1201", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 20, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.33.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"32:b4:d9:df:39:ff", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:24.017377 env[1192]: 2024-12-16 13:20:24.014 [INFO][2757] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.170.252-k8s-nfs--server--provisioner--0-eth0" Dec 16 13:20:24.039494 kubelet[1438]: E1216 13:20:24.039437 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:24.040261 env[1192]: time="2024-12-16T13:20:24.040185054Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:20:24.040371 env[1192]: time="2024-12-16T13:20:24.040279898Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:20:24.040371 env[1192]: time="2024-12-16T13:20:24.040306951Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:20:24.040511 env[1192]: time="2024-12-16T13:20:24.040483129Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658 pid=2797 runtime=io.containerd.runc.v2 Dec 16 13:20:24.045000 audit[2802]: NETFILTER_CFG table=filter:91 family=2 entries=38 op=nft_register_chain pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:20:24.045000 audit[2802]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffd7427bfa0 a2=0 a3=7ffd7427bf8c items=0 ppid=2159 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:24.045000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:20:24.058385 systemd[1]: Started cri-containerd-a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658.scope. Dec 16 13:20:24.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.084000 audit: BPF prog-id=112 op=LOAD Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2797 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:24.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633533643133613338633535663238663433663938353434303362 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2797 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:24.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633533643133613338633535663238663433663938353434303362 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit: BPF prog-id=113 op=LOAD Dec 16 13:20:24.085000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000362ed0 items=0 ppid=2797 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:24.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633533643133613338633535663238663433663938353434303362 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit: BPF prog-id=114 op=LOAD Dec 16 13:20:24.085000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000362f18 items=0 ppid=2797 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:24.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633533643133613338633535663238663433663938353434303362 Dec 16 13:20:24.085000 audit: BPF prog-id=114 op=UNLOAD Dec 16 13:20:24.085000 audit: BPF prog-id=113 op=UNLOAD Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:24.085000 audit: BPF prog-id=115 op=LOAD Dec 16 13:20:24.085000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000363328 items=0 ppid=2797 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:24.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633533643133613338633535663238663433663938353434303362 Dec 16 13:20:24.122666 env[1192]: time="2024-12-16T13:20:24.122618600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:75f6181b-9337-49f6-a5f1-e9ba7b585c4a,Namespace:default,Attempt:0,} returns sandbox id \"a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658\"" Dec 16 13:20:24.125031 env[1192]: time="2024-12-16T13:20:24.124965757Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 16 13:20:24.718812 systemd[1]: run-containerd-runc-k8s.io-a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658-runc.xW1mqj.mount: Deactivated successfully. Dec 16 13:20:25.040270 kubelet[1438]: E1216 13:20:25.040205 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:25.940165 systemd-networkd[1008]: cali60e51b789ff: Gained IPv6LL Dec 16 13:20:26.041027 kubelet[1438]: E1216 13:20:26.040975 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:26.786998 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount878259578.mount: Deactivated successfully. Dec 16 13:20:27.041332 kubelet[1438]: E1216 13:20:27.041179 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:28.042380 kubelet[1438]: E1216 13:20:28.042300 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:28.821160 systemd[1]: run-containerd-runc-k8s.io-e0cd00f502617fe903f92f6b01990461a33a5639a6c5032af603d90863d1d7e4-runc.2ulSwK.mount: Deactivated successfully. Dec 16 13:20:28.934248 kubelet[1438]: E1216 13:20:28.934055 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:20:29.043026 kubelet[1438]: E1216 13:20:29.042960 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:29.535893 env[1192]: time="2024-12-16T13:20:29.535832497Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:29.540385 env[1192]: time="2024-12-16T13:20:29.540324934Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:29.542995 env[1192]: time="2024-12-16T13:20:29.542913162Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:29.546251 env[1192]: time="2024-12-16T13:20:29.546186122Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:29.547815 env[1192]: time="2024-12-16T13:20:29.547751956Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 16 13:20:29.555078 env[1192]: time="2024-12-16T13:20:29.555014603Z" level=info msg="CreateContainer within sandbox \"a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 16 13:20:29.583958 env[1192]: time="2024-12-16T13:20:29.583901300Z" level=info msg="CreateContainer within sandbox \"a8c53d13a38c55f28f43f9854403b17cc11686873084f2c8a012c96c11629658\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"78daff4f8f8cd4fa555a3e96c111b205e72d17baaf06907446e822fcaba6a576\"" Dec 16 13:20:29.585408 env[1192]: time="2024-12-16T13:20:29.585350799Z" level=info msg="StartContainer for \"78daff4f8f8cd4fa555a3e96c111b205e72d17baaf06907446e822fcaba6a576\"" Dec 16 13:20:29.611687 systemd[1]: Started cri-containerd-78daff4f8f8cd4fa555a3e96c111b205e72d17baaf06907446e822fcaba6a576.scope. Dec 16 13:20:29.662362 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 16 13:20:29.662626 kernel: audit: type=1400 audit(1734355229.656:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.662704 kernel: audit: type=1400 audit(1734355229.656:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.673497 kernel: audit: type=1400 audit(1734355229.656:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.673661 kernel: audit: type=1400 audit(1734355229.656:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.673704 kernel: audit: type=1400 audit(1734355229.656:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.680884 kernel: audit: type=1400 audit(1734355229.656:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.689035 kernel: audit: type=1400 audit(1734355229.656:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.689228 kernel: audit: type=1400 audit(1734355229.656:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.689266 kernel: audit: type=1400 audit(1734355229.656:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.695922 kernel: audit: type=1400 audit(1734355229.662:762): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.663000 audit: BPF prog-id=116 op=LOAD Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit[2865]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2797 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:29.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738646166663466386638636434666135353561336539366331313162 Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit[2865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2797 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:29.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738646166663466386638636434666135353561336539366331313162 Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.665000 audit: BPF prog-id=117 op=LOAD Dec 16 13:20:29.665000 audit[2865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000384c50 items=0 ppid=2797 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:29.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738646166663466386638636434666135353561336539366331313162 Dec 16 13:20:29.676000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.676000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.676000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.676000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.676000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.676000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.676000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.676000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.676000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.676000 audit: BPF prog-id=118 op=LOAD Dec 16 13:20:29.676000 audit[2865]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000384c98 items=0 ppid=2797 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:29.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738646166663466386638636434666135353561336539366331313162 Dec 16 13:20:29.679000 audit: BPF prog-id=118 op=UNLOAD Dec 16 13:20:29.679000 audit: BPF prog-id=117 op=UNLOAD Dec 16 13:20:29.680000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.680000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.680000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.680000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.680000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.680000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.680000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.680000 audit[2865]: AVC avc: denied { perfmon } for pid=2865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.680000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.680000 audit[2865]: AVC avc: denied { bpf } for pid=2865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:29.680000 audit: BPF prog-id=119 op=LOAD Dec 16 13:20:29.680000 audit[2865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003850a8 items=0 ppid=2797 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:29.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738646166663466386638636434666135353561336539366331313162 Dec 16 13:20:29.725463 env[1192]: time="2024-12-16T13:20:29.725381456Z" level=info msg="StartContainer for \"78daff4f8f8cd4fa555a3e96c111b205e72d17baaf06907446e822fcaba6a576\" returns successfully" Dec 16 13:20:29.774000 audit[2894]: AVC avc: denied { search } for pid=2894 comm="rpcbind" name="crypto" dev="proc" ino=22352 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c803 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 16 13:20:29.774000 audit[2894]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f6939fd70c0 a2=0 a3=0 items=0 ppid=2876 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c803 key=(null) Dec 16 13:20:29.774000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 16 13:20:29.828000 audit[2899]: AVC avc: denied { search } for pid=2899 comm="dbus-daemon" name="crypto" dev="proc" ino=22352 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c803 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 16 13:20:29.828000 audit[2899]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f93f25810c0 a2=0 a3=0 items=0 ppid=2876 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c803 key=(null) Dec 16 13:20:29.828000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 16 13:20:29.835000 audit[2900]: AVC avc: denied { watch } for pid=2900 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538732 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c803 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c321,c803 tclass=dir permissive=0 Dec 16 13:20:29.835000 audit[2900]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55beb2b5a040 a2=2c8 a3=7ffc1a97aa9c items=0 ppid=2876 pid=2900 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c803 key=(null) Dec 16 13:20:29.835000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 16 13:20:29.840000 audit[2901]: AVC avc: denied { read } for pid=2901 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22434 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c803 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 16 13:20:29.840000 audit[2901]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f6973263320 a1=80000 a2=d a3=7ffd0955bef0 items=0 ppid=2876 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c803 key=(null) Dec 16 13:20:29.840000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 16 13:20:29.842000 audit[2901]: AVC avc: denied { search } for pid=2901 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22352 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c803 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 16 13:20:29.842000 audit[2901]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f69727b70c0 a2=0 a3=0 items=0 ppid=2876 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c803 key=(null) Dec 16 13:20:29.842000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 16 13:20:30.044347 kubelet[1438]: E1216 13:20:30.044275 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:30.427000 audit[2919]: NETFILTER_CFG table=filter:92 family=2 entries=20 op=nft_register_rule pid=2919 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:30.427000 audit[2919]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff5bc4e770 a2=0 a3=7fff5bc4e75c items=0 ppid=1726 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:30.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:30.444000 audit[2919]: NETFILTER_CFG table=nat:93 family=2 entries=106 op=nft_register_chain pid=2919 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:30.444000 audit[2919]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff5bc4e770 a2=0 a3=7fff5bc4e75c items=0 ppid=1726 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:30.444000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:31.045492 kubelet[1438]: E1216 13:20:31.045409 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:32.046339 kubelet[1438]: E1216 13:20:32.046271 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:33.046539 kubelet[1438]: E1216 13:20:33.046475 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:34.047468 kubelet[1438]: E1216 13:20:34.047349 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:35.047680 kubelet[1438]: E1216 13:20:35.047620 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:36.048270 kubelet[1438]: E1216 13:20:36.048217 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:37.049489 kubelet[1438]: E1216 13:20:37.049434 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:37.993766 kubelet[1438]: E1216 13:20:37.993705 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:38.039843 env[1192]: time="2024-12-16T13:20:38.039754907Z" level=info msg="StopPodSandbox for \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\"" Dec 16 13:20:38.051057 kubelet[1438]: E1216 13:20:38.051001 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.094 [WARNING][2937] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"43382018-3d8f-40b1-9383-fcc5b1997629", ResourceVersion:"1149", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0", Pod:"nginx-deployment-8587fbcb89-zc8n2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib6cbdef3ffe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.094 [INFO][2937] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.094 [INFO][2937] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" iface="eth0" netns="" Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.094 [INFO][2937] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.094 [INFO][2937] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.123 [INFO][2943] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" HandleID="k8s-pod-network.4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.124 [INFO][2943] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.124 [INFO][2943] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.139 [WARNING][2943] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" HandleID="k8s-pod-network.4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.139 [INFO][2943] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" HandleID="k8s-pod-network.4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.144 [INFO][2943] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:20:38.147776 env[1192]: 2024-12-16 13:20:38.145 [INFO][2937] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:38.148651 env[1192]: time="2024-12-16T13:20:38.148597745Z" level=info msg="TearDown network for sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\" successfully" Dec 16 13:20:38.148750 env[1192]: time="2024-12-16T13:20:38.148733887Z" level=info msg="StopPodSandbox for \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\" returns successfully" Dec 16 13:20:38.149678 env[1192]: time="2024-12-16T13:20:38.149596396Z" level=info msg="RemovePodSandbox for \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\"" Dec 16 13:20:38.149678 env[1192]: time="2024-12-16T13:20:38.149658986Z" level=info msg="Forcibly stopping sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\"" Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.199 [WARNING][2962] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"43382018-3d8f-40b1-9383-fcc5b1997629", ResourceVersion:"1149", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"4b5c9da21b630bf0e44061184fe6c47536e04d6f0378592fed62294d92da93d0", Pod:"nginx-deployment-8587fbcb89-zc8n2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib6cbdef3ffe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.200 [INFO][2962] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.200 [INFO][2962] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" iface="eth0" netns="" Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.200 [INFO][2962] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.200 [INFO][2962] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.258 [INFO][2969] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" HandleID="k8s-pod-network.4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.258 [INFO][2969] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.258 [INFO][2969] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.270 [WARNING][2969] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" HandleID="k8s-pod-network.4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.270 [INFO][2969] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" HandleID="k8s-pod-network.4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Workload="146.190.170.252-k8s-nginx--deployment--8587fbcb89--zc8n2-eth0" Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.277 [INFO][2969] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:20:38.282767 env[1192]: 2024-12-16 13:20:38.280 [INFO][2962] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c" Dec 16 13:20:38.284008 env[1192]: time="2024-12-16T13:20:38.283948787Z" level=info msg="TearDown network for sandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\" successfully" Dec 16 13:20:38.289671 env[1192]: time="2024-12-16T13:20:38.289591052Z" level=info msg="RemovePodSandbox \"4bc2b18f73c75fd767ae81b2953a2c90d262aec934d1b124f64be01bb39dcd4c\" returns successfully" Dec 16 13:20:38.302837 env[1192]: time="2024-12-16T13:20:38.302780891Z" level=info msg="StopPodSandbox for \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\"" Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.353 [WARNING][2990] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-csi--node--driver--bw68p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0d56ae2d-4bfb-4820-982c-56c604fe9994", ResourceVersion:"1163", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812", Pod:"csi-node-driver-bw68p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.33.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali749d0df73a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.355 [INFO][2990] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.355 [INFO][2990] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" iface="eth0" netns="" Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.355 [INFO][2990] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.355 [INFO][2990] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.383 [INFO][2996] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" HandleID="k8s-pod-network.6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.383 [INFO][2996] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.383 [INFO][2996] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.393 [WARNING][2996] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" HandleID="k8s-pod-network.6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.393 [INFO][2996] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" HandleID="k8s-pod-network.6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.395 [INFO][2996] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:20:38.398017 env[1192]: 2024-12-16 13:20:38.396 [INFO][2990] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:38.398742 env[1192]: time="2024-12-16T13:20:38.398702858Z" level=info msg="TearDown network for sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\" successfully" Dec 16 13:20:38.398835 env[1192]: time="2024-12-16T13:20:38.398817333Z" level=info msg="StopPodSandbox for \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\" returns successfully" Dec 16 13:20:38.399712 env[1192]: time="2024-12-16T13:20:38.399682896Z" level=info msg="RemovePodSandbox for \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\"" Dec 16 13:20:38.399982 env[1192]: time="2024-12-16T13:20:38.399911485Z" level=info msg="Forcibly stopping sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\"" Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.452 [WARNING][3014] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-csi--node--driver--bw68p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0d56ae2d-4bfb-4820-982c-56c604fe9994", ResourceVersion:"1163", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"0d35e351248d73532902c85c30ab7c5af974ff7b55f751e5a17217c56f016812", Pod:"csi-node-driver-bw68p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.33.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali749d0df73a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.453 [INFO][3014] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.453 [INFO][3014] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" iface="eth0" netns="" Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.453 [INFO][3014] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.453 [INFO][3014] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.485 [INFO][3020] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" HandleID="k8s-pod-network.6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.486 [INFO][3020] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.486 [INFO][3020] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.498 [WARNING][3020] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" HandleID="k8s-pod-network.6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.498 [INFO][3020] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" HandleID="k8s-pod-network.6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Workload="146.190.170.252-k8s-csi--node--driver--bw68p-eth0" Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.502 [INFO][3020] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:20:38.505575 env[1192]: 2024-12-16 13:20:38.503 [INFO][3014] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9" Dec 16 13:20:38.506533 env[1192]: time="2024-12-16T13:20:38.506491108Z" level=info msg="TearDown network for sandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\" successfully" Dec 16 13:20:38.509898 env[1192]: time="2024-12-16T13:20:38.509851665Z" level=info msg="RemovePodSandbox \"6e097564054b8e96c12412c0260d3331b180b14b37cfe33a0b196cef866897b9\" returns successfully" Dec 16 13:20:39.052796 kubelet[1438]: E1216 13:20:39.052712 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:39.702477 kubelet[1438]: I1216 13:20:39.702400 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=11.277400712 podStartE2EDuration="16.702381383s" podCreationTimestamp="2024-12-16 13:20:23 +0000 UTC" firstStartedPulling="2024-12-16 13:20:24.124302763 +0000 UTC m=+46.685335830" lastFinishedPulling="2024-12-16 13:20:29.54928342 +0000 UTC m=+52.110316501" observedRunningTime="2024-12-16 13:20:30.379639413 +0000 UTC m=+52.940672498" watchObservedRunningTime="2024-12-16 13:20:39.702381383 +0000 UTC m=+62.263414468" Dec 16 13:20:39.708420 systemd[1]: Created slice kubepods-besteffort-pod350f4bed_8dd7_46c0_bda7_3ec61008dc64.slice. Dec 16 13:20:39.813183 kubelet[1438]: I1216 13:20:39.812842 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-6c461451-2bf4-468d-9ad4-2b0201f8e6d8\" (UniqueName: \"kubernetes.io/nfs/350f4bed-8dd7-46c0-bda7-3ec61008dc64-pvc-6c461451-2bf4-468d-9ad4-2b0201f8e6d8\") pod \"test-pod-1\" (UID: \"350f4bed-8dd7-46c0-bda7-3ec61008dc64\") " pod="default/test-pod-1" Dec 16 13:20:39.813397 kubelet[1438]: I1216 13:20:39.813221 1438 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vc4wn\" (UniqueName: \"kubernetes.io/projected/350f4bed-8dd7-46c0-bda7-3ec61008dc64-kube-api-access-vc4wn\") pod \"test-pod-1\" (UID: \"350f4bed-8dd7-46c0-bda7-3ec61008dc64\") " pod="default/test-pod-1" Dec 16 13:20:39.938000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.942220 kernel: Failed to create system directory netfs Dec 16 13:20:39.942416 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 16 13:20:39.942442 kernel: audit: type=1400 audit(1734355239.938:778): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.945844 kernel: Failed to create system directory netfs Dec 16 13:20:39.945962 kernel: audit: type=1400 audit(1734355239.938:778): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.938000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.949250 kernel: Failed to create system directory netfs Dec 16 13:20:39.949365 kernel: audit: type=1400 audit(1734355239.938:778): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.938000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.952751 kernel: Failed to create system directory netfs Dec 16 13:20:39.952890 kernel: audit: type=1400 audit(1734355239.938:778): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.938000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.938000 audit[3030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557e3933c5e0 a1=153bc a2=557dfe98e2b0 a3=5 items=0 ppid=482 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:39.964668 kernel: audit: type=1300 audit(1734355239.938:778): arch=c000003e syscall=175 success=yes exit=0 a0=557e3933c5e0 a1=153bc a2=557dfe98e2b0 a3=5 items=0 ppid=482 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:39.938000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 16 13:20:39.970172 kernel: audit: type=1327 audit(1734355239.938:778): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 16 13:20:39.979620 kernel: Failed to create system directory fscache Dec 16 13:20:39.979772 kernel: audit: type=1400 audit(1734355239.967:779): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.979811 kernel: Failed to create system directory fscache Dec 16 13:20:39.979843 kernel: audit: type=1400 audit(1734355239.967:779): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.979875 kernel: Failed to create system directory fscache Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.983157 kernel: audit: type=1400 audit(1734355239.967:779): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.983276 kernel: Failed to create system directory fscache Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.987385 kernel: audit: type=1400 audit(1734355239.967:779): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.987538 kernel: Failed to create system directory fscache Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.989706 kernel: Failed to create system directory fscache Dec 16 13:20:39.989776 kernel: Failed to create system directory fscache Dec 16 13:20:39.989797 kernel: Failed to create system directory fscache Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.991902 kernel: Failed to create system directory fscache Dec 16 13:20:39.991970 kernel: Failed to create system directory fscache Dec 16 13:20:39.991998 kernel: Failed to create system directory fscache Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.993277 kernel: Failed to create system directory fscache Dec 16 13:20:39.993317 kernel: Failed to create system directory fscache Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.967000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:39.994681 kernel: Failed to create system directory fscache Dec 16 13:20:39.967000 audit[3030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557e395519c0 a1=4c0fc a2=557dfe98e2b0 a3=5 items=0 ppid=482 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:39.997161 kernel: FS-Cache: Loaded Dec 16 13:20:39.967000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.037623 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.037739 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.037771 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.037808 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.039695 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.039766 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.039784 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.040335 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.041663 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.041730 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.042321 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.043656 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.043733 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.044375 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.045137 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.046429 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.046482 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.047708 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.047752 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.049679 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.049736 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.049760 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.051627 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.051699 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.051792 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.053131 kubelet[1438]: E1216 13:20:40.053052 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.053722 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.053752 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.053778 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.055664 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.055742 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.055771 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.057756 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.057822 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.057858 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.059144 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.059234 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.060565 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.060649 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.061330 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.062530 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.062592 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.063269 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.064591 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.064656 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.065287 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.066734 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.066823 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.067468 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.068823 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.068877 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.069523 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.071447 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.071566 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.072716 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.072790 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.073332 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.074627 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.074695 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.076676 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.076756 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.076791 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.077229 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.078566 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.078612 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.080567 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.080616 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.080668 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.081246 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.082222 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.083766 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.083852 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.085671 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.085711 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.085776 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.086245 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.087654 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.087700 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.088256 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.096023 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.096759 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.098790 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.098868 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.098908 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.099414 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.100884 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.100987 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.101676 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.103873 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.104002 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.104039 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.104442 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.105219 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.106621 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.106714 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.107284 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.108714 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.108788 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.109339 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.110670 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.110716 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.111325 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.112715 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.112791 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.113310 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.114611 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.114679 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.115280 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.116728 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.116769 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.117347 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.118628 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.118677 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.119353 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.120729 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.120807 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.122727 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.122780 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.122837 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.124755 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.124858 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.124905 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.125486 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.126851 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.126898 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.127483 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.020000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.128853 kernel: Failed to create system directory sunrpc Dec 16 13:20:40.138547 kernel: RPC: Registered named UNIX socket transport module. Dec 16 13:20:40.138691 kernel: RPC: Registered udp transport module. Dec 16 13:20:40.138720 kernel: RPC: Registered tcp transport module. Dec 16 13:20:40.138745 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 16 13:20:40.020000 audit[3030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557e3959dad0 a1=1a7f1c a2=557dfe98e2b0 a3=5 items=6 ppid=482 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:40.020000 audit: CWD cwd="/" Dec 16 13:20:40.020000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:40.020000 audit: PATH item=1 name=(null) inode=24708 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:40.020000 audit: PATH item=2 name=(null) inode=24708 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:40.020000 audit: PATH item=3 name=(null) inode=24709 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:40.020000 audit: PATH item=4 name=(null) inode=24708 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:40.020000 audit: PATH item=5 name=(null) inode=24710 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:20:40.020000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.186638 kernel: Failed to create system directory nfs Dec 16 13:20:40.186733 kernel: Failed to create system directory nfs Dec 16 13:20:40.186779 kernel: Failed to create system directory nfs Dec 16 13:20:40.186806 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.188774 kernel: Failed to create system directory nfs Dec 16 13:20:40.188853 kernel: Failed to create system directory nfs Dec 16 13:20:40.188877 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.190252 kernel: Failed to create system directory nfs Dec 16 13:20:40.190334 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.191512 kernel: Failed to create system directory nfs Dec 16 13:20:40.191613 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.192792 kernel: Failed to create system directory nfs Dec 16 13:20:40.192878 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.193455 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.194726 kernel: Failed to create system directory nfs Dec 16 13:20:40.194819 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.195461 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.196710 kernel: Failed to create system directory nfs Dec 16 13:20:40.196791 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.198797 kernel: Failed to create system directory nfs Dec 16 13:20:40.198882 kernel: Failed to create system directory nfs Dec 16 13:20:40.198933 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.200775 kernel: Failed to create system directory nfs Dec 16 13:20:40.200846 kernel: Failed to create system directory nfs Dec 16 13:20:40.200869 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.202857 kernel: Failed to create system directory nfs Dec 16 13:20:40.202930 kernel: Failed to create system directory nfs Dec 16 13:20:40.203000 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.210485 kernel: Failed to create system directory nfs Dec 16 13:20:40.210562 kernel: Failed to create system directory nfs Dec 16 13:20:40.210606 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.211873 kernel: Failed to create system directory nfs Dec 16 13:20:40.211975 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.215099 kernel: Failed to create system directory nfs Dec 16 13:20:40.215362 kernel: Failed to create system directory nfs Dec 16 13:20:40.215391 kernel: Failed to create system directory nfs Dec 16 13:20:40.215409 kernel: Failed to create system directory nfs Dec 16 13:20:40.215426 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.216393 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.217897 kernel: Failed to create system directory nfs Dec 16 13:20:40.217992 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.218735 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.219555 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.220313 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.221788 kernel: Failed to create system directory nfs Dec 16 13:20:40.221868 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.222396 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.223317 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.224959 kernel: Failed to create system directory nfs Dec 16 13:20:40.225008 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.225770 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.226643 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.227383 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.229010 kernel: Failed to create system directory nfs Dec 16 13:20:40.229099 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.229725 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.230406 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.231678 kernel: Failed to create system directory nfs Dec 16 13:20:40.231815 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.232296 kernel: Failed to create system directory nfs Dec 16 13:20:40.171000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.257348 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 16 13:20:40.171000 audit[3030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557e397be700 a1=16e97c a2=557dfe98e2b0 a3=5 items=0 ppid=482 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:40.171000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.305573 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.305682 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.305707 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.307622 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.307699 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.307726 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.308216 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.309413 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.309485 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.310888 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.310961 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.311579 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.312844 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.312896 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.313398 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.314684 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.314785 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.315524 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.316576 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.316642 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.317194 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.318498 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.318561 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.319800 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.319870 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.320364 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.321707 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.321777 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.323725 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.323791 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.323811 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.324244 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.325739 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.325823 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.326320 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.327814 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.327890 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.328314 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.329602 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.329660 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.330247 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.331619 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.331718 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.332246 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.333561 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.333653 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.334877 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.334962 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.335465 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.336687 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.336773 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.337313 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.338543 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.338614 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.339929 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.340029 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.340918 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.342573 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.342618 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.342681 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.343932 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.343986 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.344520 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.345806 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.345910 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.346404 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.354592 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.354733 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.355355 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.356638 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.356688 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.357331 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.358575 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.358665 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.359819 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.359930 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.360439 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.361821 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.361865 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.362352 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.363689 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.363794 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.364319 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.365649 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.365700 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.366342 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.367607 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.367700 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.368196 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.369534 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.369611 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.370744 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.370798 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.371523 kernel: Failed to create system directory nfs4 Dec 16 13:20:40.287000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.517662 kernel: NFS: Registering the id_resolver key type Dec 16 13:20:40.517848 kernel: Key type id_resolver registered Dec 16 13:20:40.517889 kernel: Key type id_legacy registered Dec 16 13:20:40.287000 audit[3035]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa51981b010 a1=208de4 a2=55f5742f12b0 a3=5 items=0 ppid=482 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:40.287000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.535492 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.535641 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.536677 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.536793 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.537591 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.538382 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.539539 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.540436 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.541633 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.543902 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.544019 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.544055 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.544481 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.545742 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.545842 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.546428 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.547713 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.547801 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.548336 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.549729 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.549810 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.550327 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.551776 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.551876 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.552460 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.553170 kernel: Failed to create system directory rpcgss Dec 16 13:20:40.528000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:20:40.528000 audit[3036]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f288415f010 a1=70af4 a2=55e8d458d2b0 a3=5 items=0 ppid=482 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:40.528000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 16 13:20:41.054320 kubelet[1438]: E1216 13:20:41.054251 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:42.054676 kubelet[1438]: E1216 13:20:42.054615 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:43.054938 kubelet[1438]: E1216 13:20:43.054877 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:44.056017 kubelet[1438]: E1216 13:20:44.055974 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:45.057691 kubelet[1438]: E1216 13:20:45.057636 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:46.059183 kubelet[1438]: E1216 13:20:46.059033 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:46.742662 nfsidmap[3044]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-6-d620256fda' Dec 16 13:20:47.060283 kubelet[1438]: E1216 13:20:47.060178 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:48.060610 kubelet[1438]: E1216 13:20:48.060557 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:48.214008 kubelet[1438]: E1216 13:20:48.213971 1438 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Dec 16 13:20:49.062060 kubelet[1438]: E1216 13:20:49.061996 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:50.062284 kubelet[1438]: E1216 13:20:50.062224 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:51.062856 kubelet[1438]: E1216 13:20:51.062810 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:52.064401 kubelet[1438]: E1216 13:20:52.064318 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:52.886491 nfsidmap[3056]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-6-d620256fda' Dec 16 13:20:52.904025 kernel: kauditd_printk_skb: 333 callbacks suppressed Dec 16 13:20:52.904140 kernel: audit: type=1400 audit(1734355252.901:784): avc: denied { watch_reads } for pid=1260 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 16 13:20:52.901000 audit[1260]: AVC avc: denied { watch_reads } for pid=1260 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 16 13:20:52.901000 audit[1260]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f798145f40 a2=10 a3=4972e18c32a84859 items=0 ppid=1 pid=1260 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:52.910369 kernel: audit: type=1300 audit(1734355252.901:784): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f798145f40 a2=10 a3=4972e18c32a84859 items=0 ppid=1 pid=1260 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:52.901000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 16 13:20:52.912003 kernel: audit: type=1327 audit(1734355252.901:784): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 16 13:20:52.912098 kernel: audit: type=1400 audit(1734355252.901:785): avc: denied { watch_reads } for pid=1260 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 16 13:20:52.901000 audit[1260]: AVC avc: denied { watch_reads } for pid=1260 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 16 13:20:52.915261 env[1192]: time="2024-12-16T13:20:52.915208270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:350f4bed-8dd7-46c0-bda7-3ec61008dc64,Namespace:default,Attempt:0,}" Dec 16 13:20:52.901000 audit[1260]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f798145f40 a2=10 a3=4972e18c32a84859 items=0 ppid=1 pid=1260 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:52.920147 kernel: audit: type=1300 audit(1734355252.901:785): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f798145f40 a2=10 a3=4972e18c32a84859 items=0 ppid=1 pid=1260 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:52.920277 kernel: audit: type=1327 audit(1734355252.901:785): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 16 13:20:52.901000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 16 13:20:52.901000 audit[1260]: AVC avc: denied { watch_reads } for pid=1260 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 16 13:20:52.925566 kernel: audit: type=1400 audit(1734355252.901:786): avc: denied { watch_reads } for pid=1260 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 16 13:20:52.925679 kernel: audit: type=1300 audit(1734355252.901:786): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f798145f40 a2=10 a3=4972e18c32a84859 items=0 ppid=1 pid=1260 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:52.901000 audit[1260]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f798145f40 a2=10 a3=4972e18c32a84859 items=0 ppid=1 pid=1260 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:52.901000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 16 13:20:52.902000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 16 13:20:52.938894 kernel: audit: type=1327 audit(1734355252.901:786): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 16 13:20:52.939134 kernel: audit: type=1400 audit(1734355252.902:787): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 16 13:20:52.902000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 16 13:20:52.902000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 16 13:20:53.065496 kubelet[1438]: E1216 13:20:53.065434 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:53.129767 systemd-networkd[1008]: cali5ec59c6bf6e: Link UP Dec 16 13:20:53.134536 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 16 13:20:53.134656 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 16 13:20:53.133707 systemd-networkd[1008]: cali5ec59c6bf6e: Gained carrier Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.007 [INFO][3072] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.170.252-k8s-test--pod--1-eth0 default 350f4bed-8dd7-46c0-bda7-3ec61008dc64 1273 0 2024-12-16 13:20:24 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 146.190.170.252 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.170.252-k8s-test--pod--1-" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.007 [INFO][3072] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.170.252-k8s-test--pod--1-eth0" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.057 [INFO][3085] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" HandleID="k8s-pod-network.98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" Workload="146.190.170.252-k8s-test--pod--1-eth0" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.072 [INFO][3085] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" HandleID="k8s-pod-network.98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" Workload="146.190.170.252-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003bcbb0), Attrs:map[string]string{"namespace":"default", "node":"146.190.170.252", "pod":"test-pod-1", "timestamp":"2024-12-16 13:20:53.057178637 +0000 UTC"}, Hostname:"146.190.170.252", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.072 [INFO][3085] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.072 [INFO][3085] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.072 [INFO][3085] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.170.252' Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.077 [INFO][3085] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" host="146.190.170.252" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.083 [INFO][3085] ipam/ipam.go 372: Looking up existing affinities for host host="146.190.170.252" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.093 [INFO][3085] ipam/ipam.go 489: Trying affinity for 192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.097 [INFO][3085] ipam/ipam.go 155: Attempting to load block cidr=192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.101 [INFO][3085] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.64/26 host="146.190.170.252" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.101 [INFO][3085] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.64/26 handle="k8s-pod-network.98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" host="146.190.170.252" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.104 [INFO][3085] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21 Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.113 [INFO][3085] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.33.64/26 handle="k8s-pod-network.98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" host="146.190.170.252" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.123 [INFO][3085] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.33.68/26] block=192.168.33.64/26 handle="k8s-pod-network.98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" host="146.190.170.252" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.123 [INFO][3085] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.68/26] handle="k8s-pod-network.98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" host="146.190.170.252" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.123 [INFO][3085] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.123 [INFO][3085] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.33.68/26] IPv6=[] ContainerID="98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" HandleID="k8s-pod-network.98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" Workload="146.190.170.252-k8s-test--pod--1-eth0" Dec 16 13:20:53.160284 env[1192]: 2024-12-16 13:20:53.126 [INFO][3072] cni-plugin/k8s.go 386: Populated endpoint ContainerID="98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.170.252-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"350f4bed-8dd7-46c0-bda7-3ec61008dc64", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 20, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:53.161472 env[1192]: 2024-12-16 13:20:53.126 [INFO][3072] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.33.68/32] ContainerID="98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.170.252-k8s-test--pod--1-eth0" Dec 16 13:20:53.161472 env[1192]: 2024-12-16 13:20:53.126 [INFO][3072] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.170.252-k8s-test--pod--1-eth0" Dec 16 13:20:53.161472 env[1192]: 2024-12-16 13:20:53.136 [INFO][3072] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.170.252-k8s-test--pod--1-eth0" Dec 16 13:20:53.161472 env[1192]: 2024-12-16 13:20:53.138 [INFO][3072] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.170.252-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.170.252-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"350f4bed-8dd7-46c0-bda7-3ec61008dc64", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 20, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.170.252", ContainerID:"98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"66:ab:22:d3:c2:96", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:20:53.161472 env[1192]: 2024-12-16 13:20:53.149 [INFO][3072] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.170.252-k8s-test--pod--1-eth0" Dec 16 13:20:53.170000 audit[3104]: NETFILTER_CFG table=filter:94 family=2 entries=38 op=nft_register_chain pid=3104 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:20:53.170000 audit[3104]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffc4edd87d0 a2=0 a3=7ffc4edd87bc items=0 ppid=2159 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:53.170000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:20:53.180978 env[1192]: time="2024-12-16T13:20:53.180872258Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:20:53.181255 env[1192]: time="2024-12-16T13:20:53.181228118Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:20:53.181390 env[1192]: time="2024-12-16T13:20:53.181369032Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:20:53.181691 env[1192]: time="2024-12-16T13:20:53.181651896Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21 pid=3113 runtime=io.containerd.runc.v2 Dec 16 13:20:53.202296 systemd[1]: Started cri-containerd-98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21.scope. Dec 16 13:20:53.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.222000 audit: BPF prog-id=120 op=LOAD Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3113 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:53.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938646364613032333230313636313037653961643063626661623134 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=3113 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:53.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938646364613032333230313636313037653961643063626661623134 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit: BPF prog-id=121 op=LOAD Dec 16 13:20:53.223000 audit[3123]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c0003a2f30 items=0 ppid=3113 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:53.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938646364613032333230313636313037653961643063626661623134 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit: BPF prog-id=122 op=LOAD Dec 16 13:20:53.223000 audit[3123]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c0003a2f78 items=0 ppid=3113 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:53.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938646364613032333230313636313037653961643063626661623134 Dec 16 13:20:53.223000 audit: BPF prog-id=122 op=UNLOAD Dec 16 13:20:53.223000 audit: BPF prog-id=121 op=UNLOAD Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { perfmon } for pid=3123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit[3123]: AVC avc: denied { bpf } for pid=3123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.223000 audit: BPF prog-id=123 op=LOAD Dec 16 13:20:53.223000 audit[3123]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c0003a3388 items=0 ppid=3113 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:53.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938646364613032333230313636313037653961643063626661623134 Dec 16 13:20:53.262491 env[1192]: time="2024-12-16T13:20:53.262260176Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:350f4bed-8dd7-46c0-bda7-3ec61008dc64,Namespace:default,Attempt:0,} returns sandbox id \"98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21\"" Dec 16 13:20:53.265167 env[1192]: time="2024-12-16T13:20:53.264934954Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 16 13:20:53.675358 env[1192]: time="2024-12-16T13:20:53.675270090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:53.677103 env[1192]: time="2024-12-16T13:20:53.677053206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:53.679979 env[1192]: time="2024-12-16T13:20:53.679901600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:53.682285 env[1192]: time="2024-12-16T13:20:53.682237445Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:20:53.682990 env[1192]: time="2024-12-16T13:20:53.682946469Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 16 13:20:53.686769 env[1192]: time="2024-12-16T13:20:53.686698312Z" level=info msg="CreateContainer within sandbox \"98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 16 13:20:53.712077 env[1192]: time="2024-12-16T13:20:53.712008077Z" level=info msg="CreateContainer within sandbox \"98dcda02320166107e9ad0cbfab1473964ca3eefeb4771d6d6d744eb50c09d21\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"775cae7bf9bbd3e9c58959612ae33f9c55476bc7eb8a5d0ebc83945ca73f60b6\"" Dec 16 13:20:53.712905 env[1192]: time="2024-12-16T13:20:53.712862116Z" level=info msg="StartContainer for \"775cae7bf9bbd3e9c58959612ae33f9c55476bc7eb8a5d0ebc83945ca73f60b6\"" Dec 16 13:20:53.736669 systemd[1]: Started cri-containerd-775cae7bf9bbd3e9c58959612ae33f9c55476bc7eb8a5d0ebc83945ca73f60b6.scope. Dec 16 13:20:53.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.753000 audit: BPF prog-id=124 op=LOAD Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3113 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:53.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737356361653762663962626433653963353839353936313261653333 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3113 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:53.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737356361653762663962626433653963353839353936313261653333 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit: BPF prog-id=125 op=LOAD Dec 16 13:20:53.755000 audit[3155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000273dc0 items=0 ppid=3113 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:53.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737356361653762663962626433653963353839353936313261653333 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit: BPF prog-id=126 op=LOAD Dec 16 13:20:53.755000 audit[3155]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000273e08 items=0 ppid=3113 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:53.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737356361653762663962626433653963353839353936313261653333 Dec 16 13:20:53.755000 audit: BPF prog-id=126 op=UNLOAD Dec 16 13:20:53.755000 audit: BPF prog-id=125 op=UNLOAD Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:20:53.755000 audit: BPF prog-id=127 op=LOAD Dec 16 13:20:53.755000 audit[3155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d2218 items=0 ppid=3113 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:53.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737356361653762663962626433653963353839353936313261653333 Dec 16 13:20:53.778153 env[1192]: time="2024-12-16T13:20:53.777951100Z" level=info msg="StartContainer for \"775cae7bf9bbd3e9c58959612ae33f9c55476bc7eb8a5d0ebc83945ca73f60b6\" returns successfully" Dec 16 13:20:54.066657 kubelet[1438]: E1216 13:20:54.066588 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:54.438096 kubelet[1438]: I1216 13:20:54.437836 1438 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=30.017692582 podStartE2EDuration="30.437806963s" podCreationTimestamp="2024-12-16 13:20:24 +0000 UTC" firstStartedPulling="2024-12-16 13:20:53.264577318 +0000 UTC m=+75.825610451" lastFinishedPulling="2024-12-16 13:20:53.684691753 +0000 UTC m=+76.245724832" observedRunningTime="2024-12-16 13:20:54.437388258 +0000 UTC m=+76.998421352" watchObservedRunningTime="2024-12-16 13:20:54.437806963 +0000 UTC m=+76.998840053" Dec 16 13:20:54.739659 systemd-networkd[1008]: cali5ec59c6bf6e: Gained IPv6LL Dec 16 13:20:55.067499 kubelet[1438]: E1216 13:20:55.067448 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:56.068635 kubelet[1438]: E1216 13:20:56.068566 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:57.069266 kubelet[1438]: E1216 13:20:57.069195 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:57.992669 kubelet[1438]: E1216 13:20:57.992620 1438 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:58.070271 kubelet[1438]: E1216 13:20:58.070204 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 16 13:20:58.784064 systemd[1]: run-containerd-runc-k8s.io-e0cd00f502617fe903f92f6b01990461a33a5639a6c5032af603d90863d1d7e4-runc.mEVex4.mount: Deactivated successfully. Dec 16 13:20:59.071415 kubelet[1438]: E1216 13:20:59.071238 1438 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"