Dec 13 03:47:10.561533 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 03:47:10.561545 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:47:10.561552 kernel: BIOS-provided physical RAM map: Dec 13 03:47:10.561556 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Dec 13 03:47:10.561559 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Dec 13 03:47:10.561563 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Dec 13 03:47:10.561568 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Dec 13 03:47:10.561571 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Dec 13 03:47:10.561575 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b2afff] usable Dec 13 03:47:10.561579 kernel: BIOS-e820: [mem 0x0000000081b2b000-0x0000000081b2bfff] ACPI NVS Dec 13 03:47:10.561583 kernel: BIOS-e820: [mem 0x0000000081b2c000-0x0000000081b2cfff] reserved Dec 13 03:47:10.561587 kernel: BIOS-e820: [mem 0x0000000081b2d000-0x000000008afccfff] usable Dec 13 03:47:10.561591 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Dec 13 03:47:10.561595 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Dec 13 03:47:10.561600 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Dec 13 03:47:10.561605 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Dec 13 03:47:10.561609 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Dec 13 03:47:10.561613 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Dec 13 03:47:10.561617 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Dec 13 03:47:10.561621 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Dec 13 03:47:10.561625 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Dec 13 03:47:10.561629 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 03:47:10.561633 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Dec 13 03:47:10.561637 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Dec 13 03:47:10.561641 kernel: NX (Execute Disable) protection: active Dec 13 03:47:10.561645 kernel: SMBIOS 3.2.1 present. Dec 13 03:47:10.561650 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Dec 13 03:47:10.561654 kernel: tsc: Detected 3400.000 MHz processor Dec 13 03:47:10.561659 kernel: tsc: Detected 3399.906 MHz TSC Dec 13 03:47:10.561663 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 03:47:10.561667 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 03:47:10.561672 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Dec 13 03:47:10.561676 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 03:47:10.561680 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Dec 13 03:47:10.561685 kernel: Using GB pages for direct mapping Dec 13 03:47:10.561689 kernel: ACPI: Early table checksum verification disabled Dec 13 03:47:10.561694 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Dec 13 03:47:10.561698 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Dec 13 03:47:10.561702 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Dec 13 03:47:10.561706 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Dec 13 03:47:10.561712 kernel: ACPI: FACS 0x000000008C66CF80 000040 Dec 13 03:47:10.561717 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Dec 13 03:47:10.561722 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Dec 13 03:47:10.561727 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Dec 13 03:47:10.561732 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Dec 13 03:47:10.561736 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Dec 13 03:47:10.561741 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Dec 13 03:47:10.561745 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Dec 13 03:47:10.561750 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Dec 13 03:47:10.561754 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:47:10.561760 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Dec 13 03:47:10.561765 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Dec 13 03:47:10.561769 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:47:10.561774 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:47:10.561778 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Dec 13 03:47:10.561783 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Dec 13 03:47:10.561787 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:47:10.561792 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:47:10.561797 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Dec 13 03:47:10.561802 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Dec 13 03:47:10.561806 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Dec 13 03:47:10.561811 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Dec 13 03:47:10.561815 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Dec 13 03:47:10.561820 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Dec 13 03:47:10.561825 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Dec 13 03:47:10.561829 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Dec 13 03:47:10.561834 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Dec 13 03:47:10.561839 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Dec 13 03:47:10.561844 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Dec 13 03:47:10.561848 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Dec 13 03:47:10.561853 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Dec 13 03:47:10.561857 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Dec 13 03:47:10.561862 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Dec 13 03:47:10.561867 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Dec 13 03:47:10.561871 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Dec 13 03:47:10.561877 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Dec 13 03:47:10.561881 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Dec 13 03:47:10.561886 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Dec 13 03:47:10.561890 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Dec 13 03:47:10.561895 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Dec 13 03:47:10.561899 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Dec 13 03:47:10.561904 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Dec 13 03:47:10.561909 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Dec 13 03:47:10.561913 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Dec 13 03:47:10.561918 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Dec 13 03:47:10.561923 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Dec 13 03:47:10.561927 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Dec 13 03:47:10.561932 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Dec 13 03:47:10.561936 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Dec 13 03:47:10.561941 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Dec 13 03:47:10.561945 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Dec 13 03:47:10.561950 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Dec 13 03:47:10.561954 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Dec 13 03:47:10.561960 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Dec 13 03:47:10.561964 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Dec 13 03:47:10.561969 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Dec 13 03:47:10.561973 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Dec 13 03:47:10.561978 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Dec 13 03:47:10.561982 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Dec 13 03:47:10.561987 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Dec 13 03:47:10.561992 kernel: No NUMA configuration found Dec 13 03:47:10.561996 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Dec 13 03:47:10.562002 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Dec 13 03:47:10.562006 kernel: Zone ranges: Dec 13 03:47:10.562011 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 03:47:10.562016 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 03:47:10.562020 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Dec 13 03:47:10.562025 kernel: Movable zone start for each node Dec 13 03:47:10.562029 kernel: Early memory node ranges Dec 13 03:47:10.562034 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Dec 13 03:47:10.562038 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Dec 13 03:47:10.562043 kernel: node 0: [mem 0x0000000040400000-0x0000000081b2afff] Dec 13 03:47:10.562048 kernel: node 0: [mem 0x0000000081b2d000-0x000000008afccfff] Dec 13 03:47:10.562053 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Dec 13 03:47:10.562057 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Dec 13 03:47:10.562062 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Dec 13 03:47:10.562066 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Dec 13 03:47:10.562071 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 03:47:10.562079 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Dec 13 03:47:10.562084 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Dec 13 03:47:10.562089 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Dec 13 03:47:10.562094 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Dec 13 03:47:10.562100 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Dec 13 03:47:10.562105 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Dec 13 03:47:10.562110 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Dec 13 03:47:10.562115 kernel: ACPI: PM-Timer IO Port: 0x1808 Dec 13 03:47:10.562120 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 03:47:10.562125 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 03:47:10.562129 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 03:47:10.562135 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 03:47:10.562140 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 03:47:10.562145 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 03:47:10.562150 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 03:47:10.562154 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 03:47:10.562159 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 03:47:10.562164 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 03:47:10.562169 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 03:47:10.562174 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 03:47:10.562179 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 03:47:10.562184 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 03:47:10.562189 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 03:47:10.562194 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 03:47:10.562199 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Dec 13 03:47:10.562204 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 03:47:10.562209 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 03:47:10.562214 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 03:47:10.562219 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 03:47:10.562224 kernel: TSC deadline timer available Dec 13 03:47:10.562229 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Dec 13 03:47:10.562234 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Dec 13 03:47:10.562239 kernel: Booting paravirtualized kernel on bare hardware Dec 13 03:47:10.562244 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 03:47:10.562249 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 03:47:10.562254 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 03:47:10.562259 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 03:47:10.562264 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 03:47:10.562269 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Dec 13 03:47:10.562274 kernel: Policy zone: Normal Dec 13 03:47:10.562280 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:47:10.562285 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 03:47:10.562290 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Dec 13 03:47:10.562295 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Dec 13 03:47:10.562300 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 03:47:10.562305 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 730116K reserved, 0K cma-reserved) Dec 13 03:47:10.562310 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 03:47:10.562315 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 03:47:10.562320 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 03:47:10.562325 kernel: rcu: Hierarchical RCU implementation. Dec 13 03:47:10.562331 kernel: rcu: RCU event tracing is enabled. Dec 13 03:47:10.562336 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 03:47:10.562343 kernel: Rude variant of Tasks RCU enabled. Dec 13 03:47:10.562348 kernel: Tracing variant of Tasks RCU enabled. Dec 13 03:47:10.562354 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 03:47:10.562359 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 03:47:10.562364 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Dec 13 03:47:10.562368 kernel: random: crng init done Dec 13 03:47:10.562373 kernel: Console: colour dummy device 80x25 Dec 13 03:47:10.562378 kernel: printk: console [tty0] enabled Dec 13 03:47:10.562383 kernel: printk: console [ttyS1] enabled Dec 13 03:47:10.562388 kernel: ACPI: Core revision 20210730 Dec 13 03:47:10.562393 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Dec 13 03:47:10.562398 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 03:47:10.562403 kernel: DMAR: Host address width 39 Dec 13 03:47:10.562408 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Dec 13 03:47:10.562413 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Dec 13 03:47:10.562418 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Dec 13 03:47:10.562423 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Dec 13 03:47:10.562428 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Dec 13 03:47:10.562433 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Dec 13 03:47:10.562438 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Dec 13 03:47:10.562442 kernel: x2apic enabled Dec 13 03:47:10.562448 kernel: Switched APIC routing to cluster x2apic. Dec 13 03:47:10.562453 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Dec 13 03:47:10.562458 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Dec 13 03:47:10.562463 kernel: CPU0: Thermal monitoring enabled (TM1) Dec 13 03:47:10.562468 kernel: process: using mwait in idle threads Dec 13 03:47:10.562473 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 03:47:10.562477 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 03:47:10.562482 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 03:47:10.562487 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 03:47:10.562493 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 03:47:10.562498 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 03:47:10.562503 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 03:47:10.562507 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 03:47:10.562512 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 03:47:10.562517 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 03:47:10.562522 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 03:47:10.562527 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 03:47:10.562532 kernel: TAA: Mitigation: TSX disabled Dec 13 03:47:10.562536 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Dec 13 03:47:10.562541 kernel: SRBDS: Mitigation: Microcode Dec 13 03:47:10.562547 kernel: GDS: Vulnerable: No microcode Dec 13 03:47:10.562552 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 03:47:10.562556 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 03:47:10.562561 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 03:47:10.562566 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 03:47:10.562571 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 03:47:10.562576 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 03:47:10.562580 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 03:47:10.562585 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 03:47:10.562590 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Dec 13 03:47:10.562595 kernel: Freeing SMP alternatives memory: 32K Dec 13 03:47:10.562600 kernel: pid_max: default: 32768 minimum: 301 Dec 13 03:47:10.562605 kernel: LSM: Security Framework initializing Dec 13 03:47:10.562610 kernel: SELinux: Initializing. Dec 13 03:47:10.562615 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 03:47:10.562620 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 03:47:10.562624 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Dec 13 03:47:10.562629 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 03:47:10.562634 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Dec 13 03:47:10.562639 kernel: ... version: 4 Dec 13 03:47:10.562644 kernel: ... bit width: 48 Dec 13 03:47:10.562649 kernel: ... generic registers: 4 Dec 13 03:47:10.562654 kernel: ... value mask: 0000ffffffffffff Dec 13 03:47:10.562659 kernel: ... max period: 00007fffffffffff Dec 13 03:47:10.562664 kernel: ... fixed-purpose events: 3 Dec 13 03:47:10.562669 kernel: ... event mask: 000000070000000f Dec 13 03:47:10.562674 kernel: signal: max sigframe size: 2032 Dec 13 03:47:10.562679 kernel: rcu: Hierarchical SRCU implementation. Dec 13 03:47:10.562683 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Dec 13 03:47:10.562688 kernel: smp: Bringing up secondary CPUs ... Dec 13 03:47:10.562693 kernel: x86: Booting SMP configuration: Dec 13 03:47:10.562699 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Dec 13 03:47:10.562704 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 03:47:10.562709 kernel: #9 #10 #11 #12 #13 #14 #15 Dec 13 03:47:10.562714 kernel: smp: Brought up 1 node, 16 CPUs Dec 13 03:47:10.562719 kernel: smpboot: Max logical packages: 1 Dec 13 03:47:10.562723 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Dec 13 03:47:10.562728 kernel: devtmpfs: initialized Dec 13 03:47:10.562733 kernel: x86/mm: Memory block size: 128MB Dec 13 03:47:10.562738 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b2b000-0x81b2bfff] (4096 bytes) Dec 13 03:47:10.562744 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Dec 13 03:47:10.562749 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 03:47:10.562754 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 03:47:10.562759 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 03:47:10.562764 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 03:47:10.562769 kernel: audit: initializing netlink subsys (disabled) Dec 13 03:47:10.562773 kernel: audit: type=2000 audit(1734061625.041:1): state=initialized audit_enabled=0 res=1 Dec 13 03:47:10.562778 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 03:47:10.562784 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 03:47:10.562789 kernel: cpuidle: using governor menu Dec 13 03:47:10.562794 kernel: ACPI: bus type PCI registered Dec 13 03:47:10.562798 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 03:47:10.562803 kernel: dca service started, version 1.12.1 Dec 13 03:47:10.562808 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Dec 13 03:47:10.562813 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Dec 13 03:47:10.562818 kernel: PCI: Using configuration type 1 for base access Dec 13 03:47:10.562823 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Dec 13 03:47:10.562828 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 03:47:10.562833 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 03:47:10.562838 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 03:47:10.562843 kernel: ACPI: Added _OSI(Module Device) Dec 13 03:47:10.562848 kernel: ACPI: Added _OSI(Processor Device) Dec 13 03:47:10.562853 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 03:47:10.562858 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 03:47:10.562863 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 03:47:10.562867 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 03:47:10.562872 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 03:47:10.562878 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Dec 13 03:47:10.562883 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:47:10.562888 kernel: ACPI: SSDT 0xFFFF9EF5C0219A00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Dec 13 03:47:10.562893 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Dec 13 03:47:10.562898 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:47:10.562903 kernel: ACPI: SSDT 0xFFFF9EF5C1AE6800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Dec 13 03:47:10.562907 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:47:10.562912 kernel: ACPI: SSDT 0xFFFF9EF5C1A5A000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Dec 13 03:47:10.562917 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:47:10.562923 kernel: ACPI: SSDT 0xFFFF9EF5C1B4D000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Dec 13 03:47:10.562928 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:47:10.562932 kernel: ACPI: SSDT 0xFFFF9EF5C0148000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Dec 13 03:47:10.562937 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:47:10.562942 kernel: ACPI: SSDT 0xFFFF9EF5C1AE0400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Dec 13 03:47:10.562947 kernel: ACPI: Interpreter enabled Dec 13 03:47:10.562952 kernel: ACPI: PM: (supports S0 S5) Dec 13 03:47:10.562957 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 03:47:10.562962 kernel: HEST: Enabling Firmware First mode for corrected errors. Dec 13 03:47:10.562967 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Dec 13 03:47:10.562972 kernel: HEST: Table parsing has been initialized. Dec 13 03:47:10.562977 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Dec 13 03:47:10.562982 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 03:47:10.562987 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Dec 13 03:47:10.562992 kernel: ACPI: PM: Power Resource [USBC] Dec 13 03:47:10.562996 kernel: ACPI: PM: Power Resource [V0PR] Dec 13 03:47:10.563001 kernel: ACPI: PM: Power Resource [V1PR] Dec 13 03:47:10.563006 kernel: ACPI: PM: Power Resource [V2PR] Dec 13 03:47:10.563011 kernel: ACPI: PM: Power Resource [WRST] Dec 13 03:47:10.563016 kernel: ACPI: PM: Power Resource [FN00] Dec 13 03:47:10.563021 kernel: ACPI: PM: Power Resource [FN01] Dec 13 03:47:10.563026 kernel: ACPI: PM: Power Resource [FN02] Dec 13 03:47:10.563031 kernel: ACPI: PM: Power Resource [FN03] Dec 13 03:47:10.563036 kernel: ACPI: PM: Power Resource [FN04] Dec 13 03:47:10.563040 kernel: ACPI: PM: Power Resource [PIN] Dec 13 03:47:10.563045 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Dec 13 03:47:10.563108 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 03:47:10.563155 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Dec 13 03:47:10.563196 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Dec 13 03:47:10.563203 kernel: PCI host bridge to bus 0000:00 Dec 13 03:47:10.563245 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 03:47:10.563282 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 03:47:10.563319 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 03:47:10.563358 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Dec 13 03:47:10.563396 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Dec 13 03:47:10.563431 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Dec 13 03:47:10.563481 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Dec 13 03:47:10.563530 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Dec 13 03:47:10.563572 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Dec 13 03:47:10.563617 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Dec 13 03:47:10.563660 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Dec 13 03:47:10.563707 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Dec 13 03:47:10.563749 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Dec 13 03:47:10.563794 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Dec 13 03:47:10.563835 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Dec 13 03:47:10.563878 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Dec 13 03:47:10.563925 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Dec 13 03:47:10.563967 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Dec 13 03:47:10.564008 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Dec 13 03:47:10.564052 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Dec 13 03:47:10.564094 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 03:47:10.564142 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Dec 13 03:47:10.564185 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 03:47:10.564230 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Dec 13 03:47:10.564271 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Dec 13 03:47:10.564312 kernel: pci 0000:00:16.0: PME# supported from D3hot Dec 13 03:47:10.564358 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Dec 13 03:47:10.564400 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Dec 13 03:47:10.564440 kernel: pci 0000:00:16.1: PME# supported from D3hot Dec 13 03:47:10.564487 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Dec 13 03:47:10.564529 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Dec 13 03:47:10.564569 kernel: pci 0000:00:16.4: PME# supported from D3hot Dec 13 03:47:10.564614 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Dec 13 03:47:10.564654 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Dec 13 03:47:10.564698 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Dec 13 03:47:10.564744 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Dec 13 03:47:10.564788 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Dec 13 03:47:10.564828 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Dec 13 03:47:10.564870 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Dec 13 03:47:10.564910 kernel: pci 0000:00:17.0: PME# supported from D3hot Dec 13 03:47:10.564955 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Dec 13 03:47:10.564997 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Dec 13 03:47:10.565044 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Dec 13 03:47:10.565088 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Dec 13 03:47:10.565134 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Dec 13 03:47:10.565177 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Dec 13 03:47:10.565222 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Dec 13 03:47:10.565263 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Dec 13 03:47:10.565311 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Dec 13 03:47:10.565356 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Dec 13 03:47:10.565403 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Dec 13 03:47:10.565445 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 03:47:10.565491 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Dec 13 03:47:10.565536 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Dec 13 03:47:10.565578 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Dec 13 03:47:10.565619 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Dec 13 03:47:10.565665 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Dec 13 03:47:10.565706 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Dec 13 03:47:10.565755 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Dec 13 03:47:10.565799 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Dec 13 03:47:10.565841 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Dec 13 03:47:10.565885 kernel: pci 0000:01:00.0: PME# supported from D3cold Dec 13 03:47:10.565928 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 03:47:10.565971 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 03:47:10.566018 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Dec 13 03:47:10.566064 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Dec 13 03:47:10.566107 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Dec 13 03:47:10.566150 kernel: pci 0000:01:00.1: PME# supported from D3cold Dec 13 03:47:10.566191 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 03:47:10.566233 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 03:47:10.566275 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 03:47:10.566316 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 03:47:10.566386 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 03:47:10.566428 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 03:47:10.566476 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Dec 13 03:47:10.566519 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Dec 13 03:47:10.566564 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Dec 13 03:47:10.566607 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Dec 13 03:47:10.566650 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Dec 13 03:47:10.566693 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 03:47:10.566737 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 03:47:10.566780 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 03:47:10.566821 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 03:47:10.566868 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Dec 13 03:47:10.566911 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Dec 13 03:47:10.566955 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Dec 13 03:47:10.566997 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Dec 13 03:47:10.567115 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Dec 13 03:47:10.567157 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Dec 13 03:47:10.567200 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 03:47:10.567241 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 03:47:10.567282 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 03:47:10.567324 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 03:47:10.567398 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Dec 13 03:47:10.567463 kernel: pci 0000:06:00.0: enabling Extended Tags Dec 13 03:47:10.567507 kernel: pci 0000:06:00.0: supports D1 D2 Dec 13 03:47:10.567550 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 03:47:10.567592 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 03:47:10.567633 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 03:47:10.567674 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:47:10.567723 kernel: pci_bus 0000:07: extended config space not accessible Dec 13 03:47:10.567771 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Dec 13 03:47:10.567819 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Dec 13 03:47:10.567864 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Dec 13 03:47:10.567910 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Dec 13 03:47:10.567954 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 03:47:10.568000 kernel: pci 0000:07:00.0: supports D1 D2 Dec 13 03:47:10.568045 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 03:47:10.568088 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 03:47:10.568132 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 03:47:10.568175 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:47:10.568183 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Dec 13 03:47:10.568188 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Dec 13 03:47:10.568194 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Dec 13 03:47:10.568199 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Dec 13 03:47:10.568204 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Dec 13 03:47:10.568209 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Dec 13 03:47:10.568214 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Dec 13 03:47:10.568221 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Dec 13 03:47:10.568226 kernel: iommu: Default domain type: Translated Dec 13 03:47:10.568231 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 03:47:10.568276 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Dec 13 03:47:10.568320 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 03:47:10.568412 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Dec 13 03:47:10.568419 kernel: vgaarb: loaded Dec 13 03:47:10.568425 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 03:47:10.568431 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 03:47:10.568437 kernel: PTP clock support registered Dec 13 03:47:10.568442 kernel: PCI: Using ACPI for IRQ routing Dec 13 03:47:10.568447 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 03:47:10.568452 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Dec 13 03:47:10.568458 kernel: e820: reserve RAM buffer [mem 0x81b2b000-0x83ffffff] Dec 13 03:47:10.568463 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Dec 13 03:47:10.568468 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Dec 13 03:47:10.568473 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Dec 13 03:47:10.568479 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Dec 13 03:47:10.568484 kernel: clocksource: Switched to clocksource tsc-early Dec 13 03:47:10.568489 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 03:47:10.568494 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 03:47:10.568499 kernel: pnp: PnP ACPI init Dec 13 03:47:10.568543 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Dec 13 03:47:10.568586 kernel: pnp 00:02: [dma 0 disabled] Dec 13 03:47:10.568626 kernel: pnp 00:03: [dma 0 disabled] Dec 13 03:47:10.568671 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Dec 13 03:47:10.568708 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Dec 13 03:47:10.568749 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Dec 13 03:47:10.568790 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Dec 13 03:47:10.568826 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Dec 13 03:47:10.568864 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Dec 13 03:47:10.568902 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Dec 13 03:47:10.568939 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Dec 13 03:47:10.568976 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Dec 13 03:47:10.569013 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Dec 13 03:47:10.569049 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Dec 13 03:47:10.569091 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Dec 13 03:47:10.569128 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Dec 13 03:47:10.569166 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Dec 13 03:47:10.569203 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Dec 13 03:47:10.569239 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Dec 13 03:47:10.569277 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Dec 13 03:47:10.569313 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Dec 13 03:47:10.569378 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Dec 13 03:47:10.569386 kernel: pnp: PnP ACPI: found 10 devices Dec 13 03:47:10.569411 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 03:47:10.569417 kernel: NET: Registered PF_INET protocol family Dec 13 03:47:10.569423 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 03:47:10.569428 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 03:47:10.569433 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 03:47:10.569438 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 03:47:10.569444 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 03:47:10.569449 kernel: TCP: Hash tables configured (established 262144 bind 65536) Dec 13 03:47:10.569454 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 03:47:10.569460 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 03:47:10.569466 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 03:47:10.569471 kernel: NET: Registered PF_XDP protocol family Dec 13 03:47:10.569513 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Dec 13 03:47:10.569554 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Dec 13 03:47:10.569596 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Dec 13 03:47:10.569638 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 03:47:10.569683 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 03:47:10.569727 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 03:47:10.569771 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 03:47:10.569812 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 03:47:10.569855 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 03:47:10.569896 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 03:47:10.569939 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 03:47:10.569982 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 03:47:10.570024 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 03:47:10.570066 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 03:47:10.570107 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 03:47:10.570148 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 03:47:10.570190 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 03:47:10.570233 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 03:47:10.570277 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 03:47:10.570321 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 03:47:10.570388 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:47:10.570431 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 03:47:10.570474 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 03:47:10.570517 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:47:10.570556 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Dec 13 03:47:10.570593 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 03:47:10.570633 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 03:47:10.570669 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 03:47:10.570706 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Dec 13 03:47:10.570743 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Dec 13 03:47:10.570786 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Dec 13 03:47:10.570827 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 03:47:10.570872 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Dec 13 03:47:10.570913 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Dec 13 03:47:10.570957 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Dec 13 03:47:10.570996 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Dec 13 03:47:10.571039 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Dec 13 03:47:10.571078 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Dec 13 03:47:10.571120 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Dec 13 03:47:10.571161 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Dec 13 03:47:10.571170 kernel: PCI: CLS 64 bytes, default 64 Dec 13 03:47:10.571175 kernel: DMAR: No ATSR found Dec 13 03:47:10.571181 kernel: DMAR: No SATC found Dec 13 03:47:10.571186 kernel: DMAR: dmar0: Using Queued invalidation Dec 13 03:47:10.571229 kernel: pci 0000:00:00.0: Adding to iommu group 0 Dec 13 03:47:10.571272 kernel: pci 0000:00:01.0: Adding to iommu group 1 Dec 13 03:47:10.571315 kernel: pci 0000:00:08.0: Adding to iommu group 2 Dec 13 03:47:10.571360 kernel: pci 0000:00:12.0: Adding to iommu group 3 Dec 13 03:47:10.571404 kernel: pci 0000:00:14.0: Adding to iommu group 4 Dec 13 03:47:10.571447 kernel: pci 0000:00:14.2: Adding to iommu group 4 Dec 13 03:47:10.571488 kernel: pci 0000:00:15.0: Adding to iommu group 5 Dec 13 03:47:10.571530 kernel: pci 0000:00:15.1: Adding to iommu group 5 Dec 13 03:47:10.571571 kernel: pci 0000:00:16.0: Adding to iommu group 6 Dec 13 03:47:10.571632 kernel: pci 0000:00:16.1: Adding to iommu group 6 Dec 13 03:47:10.571673 kernel: pci 0000:00:16.4: Adding to iommu group 6 Dec 13 03:47:10.571713 kernel: pci 0000:00:17.0: Adding to iommu group 7 Dec 13 03:47:10.571755 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Dec 13 03:47:10.571797 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Dec 13 03:47:10.571839 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Dec 13 03:47:10.571880 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Dec 13 03:47:10.571924 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Dec 13 03:47:10.571964 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Dec 13 03:47:10.572005 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Dec 13 03:47:10.572047 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Dec 13 03:47:10.572087 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Dec 13 03:47:10.572132 kernel: pci 0000:01:00.0: Adding to iommu group 1 Dec 13 03:47:10.572175 kernel: pci 0000:01:00.1: Adding to iommu group 1 Dec 13 03:47:10.572220 kernel: pci 0000:03:00.0: Adding to iommu group 15 Dec 13 03:47:10.572263 kernel: pci 0000:04:00.0: Adding to iommu group 16 Dec 13 03:47:10.572307 kernel: pci 0000:06:00.0: Adding to iommu group 17 Dec 13 03:47:10.572376 kernel: pci 0000:07:00.0: Adding to iommu group 17 Dec 13 03:47:10.572384 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Dec 13 03:47:10.572389 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 03:47:10.572416 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Dec 13 03:47:10.572421 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Dec 13 03:47:10.572426 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Dec 13 03:47:10.572431 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Dec 13 03:47:10.572437 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Dec 13 03:47:10.572482 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Dec 13 03:47:10.572490 kernel: Initialise system trusted keyrings Dec 13 03:47:10.572495 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Dec 13 03:47:10.572502 kernel: Key type asymmetric registered Dec 13 03:47:10.572507 kernel: Asymmetric key parser 'x509' registered Dec 13 03:47:10.572512 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 03:47:10.572517 kernel: io scheduler mq-deadline registered Dec 13 03:47:10.572522 kernel: io scheduler kyber registered Dec 13 03:47:10.572528 kernel: io scheduler bfq registered Dec 13 03:47:10.572569 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Dec 13 03:47:10.572612 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Dec 13 03:47:10.572654 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Dec 13 03:47:10.572697 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Dec 13 03:47:10.572739 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Dec 13 03:47:10.572781 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Dec 13 03:47:10.572827 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Dec 13 03:47:10.572834 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Dec 13 03:47:10.572840 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Dec 13 03:47:10.572845 kernel: pstore: Registered erst as persistent store backend Dec 13 03:47:10.572852 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 03:47:10.572857 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 03:47:10.572863 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 03:47:10.572868 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 03:47:10.572874 kernel: hpet_acpi_add: no address or irqs in _CRS Dec 13 03:47:10.572917 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Dec 13 03:47:10.572925 kernel: i8042: PNP: No PS/2 controller found. Dec 13 03:47:10.572962 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Dec 13 03:47:10.573002 kernel: rtc_cmos rtc_cmos: registered as rtc0 Dec 13 03:47:10.573040 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-12-13T03:47:09 UTC (1734061629) Dec 13 03:47:10.573078 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Dec 13 03:47:10.573085 kernel: fail to initialize ptp_kvm Dec 13 03:47:10.573090 kernel: intel_pstate: Intel P-state driver initializing Dec 13 03:47:10.573095 kernel: intel_pstate: Disabling energy efficiency optimization Dec 13 03:47:10.573101 kernel: intel_pstate: HWP enabled Dec 13 03:47:10.573106 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Dec 13 03:47:10.573111 kernel: vesafb: scrolling: redraw Dec 13 03:47:10.573118 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Dec 13 03:47:10.573123 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000b3eb184c, using 768k, total 768k Dec 13 03:47:10.573128 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 03:47:10.573134 kernel: fb0: VESA VGA frame buffer device Dec 13 03:47:10.573139 kernel: NET: Registered PF_INET6 protocol family Dec 13 03:47:10.573144 kernel: Segment Routing with IPv6 Dec 13 03:47:10.573149 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 03:47:10.573154 kernel: NET: Registered PF_PACKET protocol family Dec 13 03:47:10.573160 kernel: Key type dns_resolver registered Dec 13 03:47:10.573166 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Dec 13 03:47:10.573171 kernel: microcode: Microcode Update Driver: v2.2. Dec 13 03:47:10.573176 kernel: IPI shorthand broadcast: enabled Dec 13 03:47:10.573181 kernel: sched_clock: Marking stable (1680199978, 1339848073)->(4464918689, -1444870638) Dec 13 03:47:10.573186 kernel: registered taskstats version 1 Dec 13 03:47:10.573192 kernel: Loading compiled-in X.509 certificates Dec 13 03:47:10.573197 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 03:47:10.573202 kernel: Key type .fscrypt registered Dec 13 03:47:10.573207 kernel: Key type fscrypt-provisioning registered Dec 13 03:47:10.573213 kernel: pstore: Using crash dump compression: deflate Dec 13 03:47:10.573219 kernel: ima: Allocated hash algorithm: sha1 Dec 13 03:47:10.573224 kernel: ima: No architecture policies found Dec 13 03:47:10.573229 kernel: clk: Disabling unused clocks Dec 13 03:47:10.573235 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 03:47:10.573240 kernel: Write protecting the kernel read-only data: 28672k Dec 13 03:47:10.573245 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 03:47:10.573250 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 03:47:10.573255 kernel: Run /init as init process Dec 13 03:47:10.573261 kernel: with arguments: Dec 13 03:47:10.573267 kernel: /init Dec 13 03:47:10.573272 kernel: with environment: Dec 13 03:47:10.573277 kernel: HOME=/ Dec 13 03:47:10.573282 kernel: TERM=linux Dec 13 03:47:10.573287 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 03:47:10.573293 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 03:47:10.573301 systemd[1]: Detected architecture x86-64. Dec 13 03:47:10.573306 systemd[1]: Running in initrd. Dec 13 03:47:10.573312 systemd[1]: No hostname configured, using default hostname. Dec 13 03:47:10.573317 systemd[1]: Hostname set to . Dec 13 03:47:10.573322 systemd[1]: Initializing machine ID from random generator. Dec 13 03:47:10.573328 systemd[1]: Queued start job for default target initrd.target. Dec 13 03:47:10.573333 systemd[1]: Started systemd-ask-password-console.path. Dec 13 03:47:10.573340 systemd[1]: Reached target cryptsetup.target. Dec 13 03:47:10.573368 systemd[1]: Reached target paths.target. Dec 13 03:47:10.573374 systemd[1]: Reached target slices.target. Dec 13 03:47:10.573380 systemd[1]: Reached target swap.target. Dec 13 03:47:10.573385 systemd[1]: Reached target timers.target. Dec 13 03:47:10.573410 systemd[1]: Listening on iscsid.socket. Dec 13 03:47:10.573416 systemd[1]: Listening on iscsiuio.socket. Dec 13 03:47:10.573421 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 03:47:10.573427 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 03:47:10.573433 systemd[1]: Listening on systemd-journald.socket. Dec 13 03:47:10.573439 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Dec 13 03:47:10.573444 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Dec 13 03:47:10.573449 kernel: clocksource: Switched to clocksource tsc Dec 13 03:47:10.573455 systemd[1]: Listening on systemd-networkd.socket. Dec 13 03:47:10.573460 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 03:47:10.573465 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 03:47:10.573471 systemd[1]: Reached target sockets.target. Dec 13 03:47:10.573476 systemd[1]: Starting kmod-static-nodes.service... Dec 13 03:47:10.573482 systemd[1]: Finished network-cleanup.service. Dec 13 03:47:10.573488 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 03:47:10.573493 systemd[1]: Starting systemd-journald.service... Dec 13 03:47:10.573499 systemd[1]: Starting systemd-modules-load.service... Dec 13 03:47:10.573506 systemd-journald[267]: Journal started Dec 13 03:47:10.573532 systemd-journald[267]: Runtime Journal (/run/log/journal/ce8698e52dc04460b477af0429c4e3ee) is 8.0M, max 640.1M, 632.1M free. Dec 13 03:47:10.575768 systemd-modules-load[268]: Inserted module 'overlay' Dec 13 03:47:10.605549 kernel: audit: type=1334 audit(1734061630.582:2): prog-id=6 op=LOAD Dec 13 03:47:10.605560 systemd[1]: Starting systemd-resolved.service... Dec 13 03:47:10.582000 audit: BPF prog-id=6 op=LOAD Dec 13 03:47:10.649399 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 03:47:10.649415 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 03:47:10.682391 kernel: Bridge firewalling registered Dec 13 03:47:10.682407 systemd[1]: Started systemd-journald.service. Dec 13 03:47:10.696621 systemd-modules-load[268]: Inserted module 'br_netfilter' Dec 13 03:47:10.745629 kernel: audit: type=1130 audit(1734061630.704:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:10.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:10.699078 systemd-resolved[270]: Positive Trust Anchors: Dec 13 03:47:10.808388 kernel: SCSI subsystem initialized Dec 13 03:47:10.808399 kernel: audit: type=1130 audit(1734061630.757:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:10.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:10.699084 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 03:47:10.911770 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 03:47:10.911783 kernel: audit: type=1130 audit(1734061630.828:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:10.911791 kernel: device-mapper: uevent: version 1.0.3 Dec 13 03:47:10.911799 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 03:47:10.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:10.699104 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 03:47:10.994610 kernel: audit: type=1130 audit(1734061630.929:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:10.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:10.700660 systemd-resolved[270]: Defaulting to hostname 'linux'. Dec 13 03:47:11.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:10.704566 systemd[1]: Started systemd-resolved.service. Dec 13 03:47:11.102568 kernel: audit: type=1130 audit(1734061631.003:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:11.102579 kernel: audit: type=1130 audit(1734061631.056:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:11.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:10.757525 systemd[1]: Finished kmod-static-nodes.service. Dec 13 03:47:10.828509 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 03:47:10.925335 systemd-modules-load[268]: Inserted module 'dm_multipath' Dec 13 03:47:10.929641 systemd[1]: Finished systemd-modules-load.service. Dec 13 03:47:11.003711 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 03:47:11.056661 systemd[1]: Reached target nss-lookup.target. Dec 13 03:47:11.111945 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 03:47:11.125868 systemd[1]: Starting systemd-sysctl.service... Dec 13 03:47:11.133937 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 03:47:11.134640 systemd[1]: Finished systemd-sysctl.service. Dec 13 03:47:11.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:11.136753 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 03:47:11.182478 kernel: audit: type=1130 audit(1734061631.134:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:11.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:11.198669 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 03:47:11.265454 kernel: audit: type=1130 audit(1734061631.198:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:11.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:11.256918 systemd[1]: Starting dracut-cmdline.service... Dec 13 03:47:11.280465 dracut-cmdline[292]: dracut-dracut-053 Dec 13 03:47:11.280465 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 03:47:11.280465 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:47:11.349479 kernel: Loading iSCSI transport class v2.0-870. Dec 13 03:47:11.349491 kernel: iscsi: registered transport (tcp) Dec 13 03:47:11.402776 kernel: iscsi: registered transport (qla4xxx) Dec 13 03:47:11.402793 kernel: QLogic iSCSI HBA Driver Dec 13 03:47:11.418954 systemd[1]: Finished dracut-cmdline.service. Dec 13 03:47:11.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:11.428066 systemd[1]: Starting dracut-pre-udev.service... Dec 13 03:47:11.485411 kernel: raid6: avx2x4 gen() 39331 MB/s Dec 13 03:47:11.520423 kernel: raid6: avx2x4 xor() 18279 MB/s Dec 13 03:47:11.555422 kernel: raid6: avx2x2 gen() 53701 MB/s Dec 13 03:47:11.590421 kernel: raid6: avx2x2 xor() 32070 MB/s Dec 13 03:47:11.625379 kernel: raid6: avx2x1 gen() 45196 MB/s Dec 13 03:47:11.659344 kernel: raid6: avx2x1 xor() 27895 MB/s Dec 13 03:47:11.693345 kernel: raid6: sse2x4 gen() 21375 MB/s Dec 13 03:47:11.727376 kernel: raid6: sse2x4 xor() 12021 MB/s Dec 13 03:47:11.761376 kernel: raid6: sse2x2 gen() 21624 MB/s Dec 13 03:47:11.795421 kernel: raid6: sse2x2 xor() 13390 MB/s Dec 13 03:47:11.829379 kernel: raid6: sse2x1 gen() 18294 MB/s Dec 13 03:47:11.881337 kernel: raid6: sse2x1 xor() 8924 MB/s Dec 13 03:47:11.881355 kernel: raid6: using algorithm avx2x2 gen() 53701 MB/s Dec 13 03:47:11.881363 kernel: raid6: .... xor() 32070 MB/s, rmw enabled Dec 13 03:47:11.899589 kernel: raid6: using avx2x2 recovery algorithm Dec 13 03:47:11.945366 kernel: xor: automatically using best checksumming function avx Dec 13 03:47:12.025383 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 03:47:12.030202 systemd[1]: Finished dracut-pre-udev.service. Dec 13 03:47:12.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:12.030000 audit: BPF prog-id=7 op=LOAD Dec 13 03:47:12.030000 audit: BPF prog-id=8 op=LOAD Dec 13 03:47:12.031025 systemd[1]: Starting systemd-udevd.service... Dec 13 03:47:12.038814 systemd-udevd[472]: Using default interface naming scheme 'v252'. Dec 13 03:47:12.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:12.050654 systemd[1]: Started systemd-udevd.service. Dec 13 03:47:12.091490 dracut-pre-trigger[485]: rd.md=0: removing MD RAID activation Dec 13 03:47:12.067975 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 03:47:12.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:12.094796 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 03:47:12.109311 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 03:47:12.160681 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 03:47:12.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:12.190351 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 03:47:12.192350 kernel: libata version 3.00 loaded. Dec 13 03:47:12.227644 kernel: ACPI: bus type USB registered Dec 13 03:47:12.227676 kernel: usbcore: registered new interface driver usbfs Dec 13 03:47:12.227685 kernel: usbcore: registered new interface driver hub Dec 13 03:47:12.245521 kernel: usbcore: registered new device driver usb Dec 13 03:47:12.299853 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Dec 13 03:47:12.299914 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Dec 13 03:47:12.300349 kernel: ahci 0000:00:17.0: version 3.0 Dec 13 03:47:12.733720 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 03:47:12.733733 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Dec 13 03:47:12.733801 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Dec 13 03:47:12.733864 kernel: pps pps0: new PPS source ptp0 Dec 13 03:47:12.733951 kernel: igb 0000:03:00.0: added PHC on eth0 Dec 13 03:47:12.734032 kernel: scsi host0: ahci Dec 13 03:47:12.734138 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 03:47:12.734210 kernel: scsi host1: ahci Dec 13 03:47:12.734327 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f1:0a Dec 13 03:47:12.734412 kernel: scsi host2: ahci Dec 13 03:47:12.734510 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Dec 13 03:47:12.734601 kernel: scsi host3: ahci Dec 13 03:47:12.734675 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 03:47:12.734727 kernel: scsi host4: ahci Dec 13 03:47:12.734794 kernel: scsi host5: ahci Dec 13 03:47:12.734845 kernel: scsi host6: ahci Dec 13 03:47:12.734894 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Dec 13 03:47:12.734902 kernel: pps pps1: new PPS source ptp1 Dec 13 03:47:12.734951 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Dec 13 03:47:12.734958 kernel: igb 0000:04:00.0: added PHC on eth1 Dec 13 03:47:12.735010 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Dec 13 03:47:12.735019 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 03:47:12.735066 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Dec 13 03:47:12.735074 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f1:0b Dec 13 03:47:12.735122 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Dec 13 03:47:12.735129 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Dec 13 03:47:12.735176 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Dec 13 03:47:12.735183 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 03:47:12.735230 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Dec 13 03:47:12.735239 kernel: AES CTR mode by8 optimization enabled Dec 13 03:47:12.749384 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Dec 13 03:47:13.334286 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 03:47:13.334363 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 03:47:13.334372 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 03:47:13.334423 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 03:47:13.334431 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 03:47:13.334479 kernel: ata7: SATA link down (SStatus 0 SControl 300) Dec 13 03:47:13.334487 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 03:47:13.334497 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 03:47:13.334503 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 03:47:13.334510 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 03:47:13.334516 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 03:47:13.334522 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 03:47:13.334528 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 03:47:13.334535 kernel: ata1.00: Features: NCQ-prio Dec 13 03:47:13.334541 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 03:47:13.334547 kernel: ata2.00: Features: NCQ-prio Dec 13 03:47:13.334554 kernel: ata1.00: configured for UDMA/133 Dec 13 03:47:13.334560 kernel: ata2.00: configured for UDMA/133 Dec 13 03:47:13.334566 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 03:47:13.334583 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 03:47:13.345411 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Dec 13 03:47:14.004222 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 03:47:14.004304 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 03:47:14.004370 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Dec 13 03:47:14.004424 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 03:47:14.004476 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Dec 13 03:47:14.004524 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Dec 13 03:47:14.004580 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 03:47:14.004627 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Dec 13 03:47:14.004674 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Dec 13 03:47:14.004723 kernel: hub 1-0:1.0: USB hub found Dec 13 03:47:14.004784 kernel: hub 1-0:1.0: 16 ports detected Dec 13 03:47:14.004837 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:47:14.004844 kernel: hub 2-0:1.0: USB hub found Dec 13 03:47:14.004901 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 03:47:14.004909 kernel: hub 2-0:1.0: 10 ports detected Dec 13 03:47:14.004960 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 03:47:14.079292 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 03:47:14.079382 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Dec 13 03:47:14.079447 kernel: sd 1:0:0:0: [sdb] Write Protect is off Dec 13 03:47:14.079508 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Dec 13 03:47:14.079570 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 03:47:14.079626 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 03:47:14.079634 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 03:47:14.079641 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 03:47:14.079700 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Dec 13 03:47:14.079754 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Dec 13 03:47:14.079811 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 03:47:14.079873 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 03:47:14.079963 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Dec 13 03:47:14.080054 kernel: port_module: 9 callbacks suppressed Dec 13 03:47:14.080068 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Dec 13 03:47:14.080154 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 03:47:14.080253 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 03:47:14.080337 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:47:14.080352 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Dec 13 03:47:14.080424 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 03:47:14.080431 kernel: GPT:9289727 != 937703087 Dec 13 03:47:14.080438 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 03:47:14.080445 kernel: GPT:9289727 != 937703087 Dec 13 03:47:14.080453 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 03:47:14.080508 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 03:47:14.080516 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:47:14.080522 kernel: hub 1-14:1.0: USB hub found Dec 13 03:47:14.080585 kernel: hub 1-14:1.0: 4 ports detected Dec 13 03:47:14.080657 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:47:14.080667 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 03:47:14.097391 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Dec 13 03:47:14.118346 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Dec 13 03:47:14.124730 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 03:47:14.160454 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (645) Dec 13 03:47:14.159274 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 03:47:14.170430 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 03:47:14.173173 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 03:47:14.214604 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 03:47:14.231736 systemd[1]: Starting disk-uuid.service... Dec 13 03:47:14.252499 disk-uuid[687]: Primary Header is updated. Dec 13 03:47:14.252499 disk-uuid[687]: Secondary Entries is updated. Dec 13 03:47:14.252499 disk-uuid[687]: Secondary Header is updated. Dec 13 03:47:14.330412 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:47:14.330425 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:47:14.330432 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Dec 13 03:47:14.330454 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:47:14.330461 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:47:14.330467 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:47:14.352382 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:47:14.409389 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 03:47:14.440373 kernel: usbcore: registered new interface driver usbhid Dec 13 03:47:14.440404 kernel: usbhid: USB HID core driver Dec 13 03:47:14.473379 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Dec 13 03:47:14.591275 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Dec 13 03:47:14.591416 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Dec 13 03:47:14.591426 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Dec 13 03:47:15.336909 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:47:15.357056 disk-uuid[688]: The operation has completed successfully. Dec 13 03:47:15.366577 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:47:15.399872 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 03:47:15.499798 kernel: audit: type=1130 audit(1734061635.408:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.499847 kernel: audit: type=1131 audit(1734061635.408:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.399918 systemd[1]: Finished disk-uuid.service. Dec 13 03:47:15.529437 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 03:47:15.409045 systemd[1]: Starting verity-setup.service... Dec 13 03:47:15.562152 systemd[1]: Found device dev-mapper-usr.device. Dec 13 03:47:15.572394 systemd[1]: Mounting sysusr-usr.mount... Dec 13 03:47:15.586576 systemd[1]: Finished verity-setup.service. Dec 13 03:47:15.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.649374 kernel: audit: type=1130 audit(1734061635.601:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.677703 systemd[1]: Mounted sysusr-usr.mount. Dec 13 03:47:15.691564 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 03:47:15.684640 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 03:47:15.777069 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:47:15.777084 kernel: BTRFS info (device sda6): using free space tree Dec 13 03:47:15.777091 kernel: BTRFS info (device sda6): has skinny extents Dec 13 03:47:15.777099 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 03:47:15.685047 systemd[1]: Starting ignition-setup.service... Dec 13 03:47:15.704719 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 03:47:15.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.785894 systemd[1]: Finished ignition-setup.service. Dec 13 03:47:15.907484 kernel: audit: type=1130 audit(1734061635.802:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.907498 kernel: audit: type=1130 audit(1734061635.858:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.822611 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 03:47:15.938058 kernel: audit: type=1334 audit(1734061635.915:24): prog-id=9 op=LOAD Dec 13 03:47:15.915000 audit: BPF prog-id=9 op=LOAD Dec 13 03:47:15.859015 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 03:47:15.916236 systemd[1]: Starting systemd-networkd.service... Dec 13 03:47:15.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:16.001407 ignition[869]: Ignition 2.14.0 Dec 13 03:47:16.024605 kernel: audit: type=1130 audit(1734061635.961:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.952135 systemd-networkd[875]: lo: Link UP Dec 13 03:47:16.001412 ignition[869]: Stage: fetch-offline Dec 13 03:47:16.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:15.952138 systemd-networkd[875]: lo: Gained carrier Dec 13 03:47:16.172005 kernel: audit: type=1130 audit(1734061636.038:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:16.172019 kernel: audit: type=1130 audit(1734061636.098:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:16.172027 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 03:47:16.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:16.001438 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:47:16.206600 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Dec 13 03:47:15.952481 systemd-networkd[875]: Enumeration completed Dec 13 03:47:16.001451 ignition[869]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:47:15.952553 systemd[1]: Started systemd-networkd.service. Dec 13 03:47:16.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:16.004096 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:47:15.953465 systemd-networkd[875]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:47:16.253481 iscsid[900]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 03:47:16.253481 iscsid[900]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 03:47:16.253481 iscsid[900]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 03:47:16.253481 iscsid[900]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 03:47:16.253481 iscsid[900]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 03:47:16.253481 iscsid[900]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 03:47:16.253481 iscsid[900]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 03:47:16.438552 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 03:47:16.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:16.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:16.004163 ignition[869]: parsed url from cmdline: "" Dec 13 03:47:15.961464 systemd[1]: Reached target network.target. Dec 13 03:47:16.004165 ignition[869]: no config URL provided Dec 13 03:47:16.014188 unknown[869]: fetched base config from "system" Dec 13 03:47:16.004168 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 03:47:16.014192 unknown[869]: fetched user config from "system" Dec 13 03:47:16.004179 ignition[869]: parsing config with SHA512: d904c2f5a925cfda6d34fdf1fcb0ca0590348f58f350410fcac43da42237b11c916f929b8e3a5a8535fe06cb6ee705cba49cb6b94448be88ed895dc7c1186070 Dec 13 03:47:16.019020 systemd[1]: Starting iscsiuio.service... Dec 13 03:47:16.014385 ignition[869]: fetch-offline: fetch-offline passed Dec 13 03:47:16.031655 systemd[1]: Started iscsiuio.service. Dec 13 03:47:16.014388 ignition[869]: POST message to Packet Timeline Dec 13 03:47:16.038540 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 03:47:16.014393 ignition[869]: POST Status error: resource requires networking Dec 13 03:47:16.098607 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 03:47:16.014434 ignition[869]: Ignition finished successfully Dec 13 03:47:16.099048 systemd[1]: Starting ignition-kargs.service... Dec 13 03:47:16.176557 ignition[889]: Ignition 2.14.0 Dec 13 03:47:16.172783 systemd-networkd[875]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:47:16.176560 ignition[889]: Stage: kargs Dec 13 03:47:16.185895 systemd[1]: Starting iscsid.service... Dec 13 03:47:16.176617 ignition[889]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:47:16.213496 systemd[1]: Started iscsid.service. Dec 13 03:47:16.176626 ignition[889]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:47:16.228902 systemd[1]: Starting dracut-initqueue.service... Dec 13 03:47:16.177956 ignition[889]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:47:16.243556 systemd[1]: Finished dracut-initqueue.service. Dec 13 03:47:16.179270 ignition[889]: kargs: kargs passed Dec 13 03:47:16.271624 systemd[1]: Reached target remote-fs-pre.target. Dec 13 03:47:16.179273 ignition[889]: POST message to Packet Timeline Dec 13 03:47:16.291517 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 03:47:16.179284 ignition[889]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:47:16.327623 systemd[1]: Reached target remote-fs.target. Dec 13 03:47:16.182894 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43472->[::1]:53: read: connection refused Dec 13 03:47:16.350234 systemd[1]: Starting dracut-pre-mount.service... Dec 13 03:47:16.383415 ignition[889]: GET https://metadata.packet.net/metadata: attempt #2 Dec 13 03:47:16.379704 systemd[1]: Finished dracut-pre-mount.service. Dec 13 03:47:16.384017 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:34281->[::1]:53: read: connection refused Dec 13 03:47:16.415657 systemd-networkd[875]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:47:16.444841 systemd-networkd[875]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:47:16.474991 systemd-networkd[875]: enp1s0f1np1: Link UP Dec 13 03:47:16.475406 systemd-networkd[875]: enp1s0f1np1: Gained carrier Dec 13 03:47:16.490836 systemd-networkd[875]: enp1s0f0np0: Link UP Dec 13 03:47:16.491205 systemd-networkd[875]: eno2: Link UP Dec 13 03:47:16.785055 ignition[889]: GET https://metadata.packet.net/metadata: attempt #3 Dec 13 03:47:16.491573 systemd-networkd[875]: eno1: Link UP Dec 13 03:47:16.786115 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33415->[::1]:53: read: connection refused Dec 13 03:47:17.249164 systemd-networkd[875]: enp1s0f0np0: Gained carrier Dec 13 03:47:17.258457 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Dec 13 03:47:17.284525 systemd-networkd[875]: enp1s0f0np0: DHCPv4 address 136.144.54.113/31, gateway 136.144.54.112 acquired from 145.40.83.140 Dec 13 03:47:17.586566 ignition[889]: GET https://metadata.packet.net/metadata: attempt #4 Dec 13 03:47:17.587720 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:51594->[::1]:53: read: connection refused Dec 13 03:47:17.865930 systemd-networkd[875]: enp1s0f1np1: Gained IPv6LL Dec 13 03:47:18.569944 systemd-networkd[875]: enp1s0f0np0: Gained IPv6LL Dec 13 03:47:19.188490 ignition[889]: GET https://metadata.packet.net/metadata: attempt #5 Dec 13 03:47:19.189648 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44959->[::1]:53: read: connection refused Dec 13 03:47:22.392316 ignition[889]: GET https://metadata.packet.net/metadata: attempt #6 Dec 13 03:47:24.193458 ignition[889]: GET result: OK Dec 13 03:47:24.514962 ignition[889]: Ignition finished successfully Dec 13 03:47:24.520098 systemd[1]: Finished ignition-kargs.service. Dec 13 03:47:24.611016 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 03:47:24.611032 kernel: audit: type=1130 audit(1734061644.535:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:24.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:24.544747 ignition[918]: Ignition 2.14.0 Dec 13 03:47:24.537627 systemd[1]: Starting ignition-disks.service... Dec 13 03:47:24.544751 ignition[918]: Stage: disks Dec 13 03:47:24.544808 ignition[918]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:47:24.544818 ignition[918]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:47:24.547230 ignition[918]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:47:24.547695 ignition[918]: disks: disks passed Dec 13 03:47:24.547699 ignition[918]: POST message to Packet Timeline Dec 13 03:47:24.547709 ignition[918]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:47:26.298215 ignition[918]: GET result: OK Dec 13 03:47:26.676222 ignition[918]: Ignition finished successfully Dec 13 03:47:26.679210 systemd[1]: Finished ignition-disks.service. Dec 13 03:47:26.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:26.691934 systemd[1]: Reached target initrd-root-device.target. Dec 13 03:47:26.770610 kernel: audit: type=1130 audit(1734061646.691:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:26.756564 systemd[1]: Reached target local-fs-pre.target. Dec 13 03:47:26.756601 systemd[1]: Reached target local-fs.target. Dec 13 03:47:26.779582 systemd[1]: Reached target sysinit.target. Dec 13 03:47:26.793506 systemd[1]: Reached target basic.target. Dec 13 03:47:26.794090 systemd[1]: Starting systemd-fsck-root.service... Dec 13 03:47:26.817221 systemd-fsck[933]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 03:47:26.838471 systemd[1]: Finished systemd-fsck-root.service. Dec 13 03:47:26.932370 kernel: audit: type=1130 audit(1734061646.846:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:26.932385 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 03:47:26.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:26.848420 systemd[1]: Mounting sysroot.mount... Dec 13 03:47:26.940067 systemd[1]: Mounted sysroot.mount. Dec 13 03:47:26.953676 systemd[1]: Reached target initrd-root-fs.target. Dec 13 03:47:26.961311 systemd[1]: Mounting sysroot-usr.mount... Dec 13 03:47:26.975257 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 03:47:26.994973 systemd[1]: Starting flatcar-static-network.service... Dec 13 03:47:27.011459 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 03:47:27.011577 systemd[1]: Reached target ignition-diskful.target. Dec 13 03:47:27.031638 systemd[1]: Mounted sysroot-usr.mount. Dec 13 03:47:27.053952 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 03:47:27.193524 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (946) Dec 13 03:47:27.193542 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:47:27.193551 kernel: BTRFS info (device sda6): using free space tree Dec 13 03:47:27.193558 kernel: BTRFS info (device sda6): has skinny extents Dec 13 03:47:27.193565 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 03:47:27.193646 coreos-metadata[941]: Dec 13 03:47:27.100 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:47:27.256486 kernel: audit: type=1130 audit(1734061647.201:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:27.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:27.256522 coreos-metadata[940]: Dec 13 03:47:27.100 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:47:27.066764 systemd[1]: Starting initrd-setup-root.service... Dec 13 03:47:27.108463 systemd[1]: Finished initrd-setup-root.service. Dec 13 03:47:27.306410 initrd-setup-root[951]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 03:47:27.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:27.202614 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 03:47:27.378596 kernel: audit: type=1130 audit(1734061647.314:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:27.378610 initrd-setup-root[960]: cut: /sysroot/etc/group: No such file or directory Dec 13 03:47:27.264939 systemd[1]: Starting ignition-mount.service... Dec 13 03:47:27.395574 initrd-setup-root[968]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 03:47:27.405553 ignition[1016]: INFO : Ignition 2.14.0 Dec 13 03:47:27.405553 ignition[1016]: INFO : Stage: mount Dec 13 03:47:27.405553 ignition[1016]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:47:27.405553 ignition[1016]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:47:27.405553 ignition[1016]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:47:27.405553 ignition[1016]: INFO : mount: mount passed Dec 13 03:47:27.405553 ignition[1016]: INFO : POST message to Packet Timeline Dec 13 03:47:27.405553 ignition[1016]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:47:27.284925 systemd[1]: Starting sysroot-boot.service... Dec 13 03:47:27.495619 initrd-setup-root[976]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 03:47:27.299781 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 03:47:27.299839 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 03:47:27.303440 systemd[1]: Finished sysroot-boot.service. Dec 13 03:47:28.328212 coreos-metadata[940]: Dec 13 03:47:28.328 INFO Fetch successful Dec 13 03:47:28.403592 coreos-metadata[940]: Dec 13 03:47:28.403 INFO wrote hostname ci-3510.3.6-a-bb67cfe667 to /sysroot/etc/hostname Dec 13 03:47:28.404120 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 03:47:28.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:28.481403 kernel: audit: type=1130 audit(1734061648.424:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:28.868046 coreos-metadata[941]: Dec 13 03:47:28.867 INFO Fetch successful Dec 13 03:47:28.898878 systemd[1]: flatcar-static-network.service: Deactivated successfully. Dec 13 03:47:28.898927 systemd[1]: Finished flatcar-static-network.service. Dec 13 03:47:28.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:28.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:29.030539 kernel: audit: type=1130 audit(1734061648.915:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:29.030557 kernel: audit: type=1131 audit(1734061648.915:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:29.131475 ignition[1016]: INFO : GET result: OK Dec 13 03:47:29.471439 ignition[1016]: INFO : Ignition finished successfully Dec 13 03:47:29.474072 systemd[1]: Finished ignition-mount.service. Dec 13 03:47:29.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:29.490665 systemd[1]: Starting ignition-files.service... Dec 13 03:47:29.561529 kernel: audit: type=1130 audit(1734061649.488:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:29.555167 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 03:47:29.620187 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1031) Dec 13 03:47:29.620202 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:47:29.620210 kernel: BTRFS info (device sda6): using free space tree Dec 13 03:47:29.643921 kernel: BTRFS info (device sda6): has skinny extents Dec 13 03:47:29.693344 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 03:47:29.694881 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 03:47:29.711486 ignition[1050]: INFO : Ignition 2.14.0 Dec 13 03:47:29.711486 ignition[1050]: INFO : Stage: files Dec 13 03:47:29.711486 ignition[1050]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:47:29.711486 ignition[1050]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:47:29.711486 ignition[1050]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:47:29.711486 ignition[1050]: DEBUG : files: compiled without relabeling support, skipping Dec 13 03:47:29.805396 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1060) Dec 13 03:47:29.714559 unknown[1050]: wrote ssh authorized keys file for user: core Dec 13 03:47:29.813528 ignition[1050]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 03:47:29.813528 ignition[1050]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 03:47:29.813528 ignition[1050]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 03:47:29.813528 ignition[1050]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 03:47:29.813528 ignition[1050]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 03:47:29.813528 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 03:47:29.813528 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 03:47:29.813528 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 03:47:29.813528 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 03:47:29.813528 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:47:29.813528 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:47:29.813528 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 03:47:29.813528 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 03:47:29.813528 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem866312348" Dec 13 03:47:29.813528 ignition[1050]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem866312348": device or resource busy Dec 13 03:47:29.813528 ignition[1050]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem866312348", trying btrfs: device or resource busy Dec 13 03:47:30.080697 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem866312348" Dec 13 03:47:30.080697 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem866312348" Dec 13 03:47:30.080697 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem866312348" Dec 13 03:47:30.080697 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem866312348" Dec 13 03:47:30.080697 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 03:47:30.080697 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:47:30.080697 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 03:47:30.234804 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 03:47:30.457547 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:47:30.457547 ignition[1050]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 03:47:30.457547 ignition[1050]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 03:47:30.457547 ignition[1050]: INFO : files: op(c): [started] processing unit "packet-phone-home.service" Dec 13 03:47:30.457547 ignition[1050]: INFO : files: op(c): [finished] processing unit "packet-phone-home.service" Dec 13 03:47:30.457547 ignition[1050]: INFO : files: op(d): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 03:47:30.538608 ignition[1050]: INFO : files: op(d): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 03:47:30.538608 ignition[1050]: INFO : files: op(e): [started] setting preset to enabled for "packet-phone-home.service" Dec 13 03:47:30.538608 ignition[1050]: INFO : files: op(e): [finished] setting preset to enabled for "packet-phone-home.service" Dec 13 03:47:30.538608 ignition[1050]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 03:47:30.538608 ignition[1050]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 03:47:30.538608 ignition[1050]: INFO : files: files passed Dec 13 03:47:30.538608 ignition[1050]: INFO : POST message to Packet Timeline Dec 13 03:47:30.538608 ignition[1050]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:47:31.989854 ignition[1050]: INFO : GET result: OK Dec 13 03:47:32.321807 ignition[1050]: INFO : Ignition finished successfully Dec 13 03:47:32.324872 systemd[1]: Finished ignition-files.service. Dec 13 03:47:32.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.346213 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 03:47:32.419586 kernel: audit: type=1130 audit(1734061652.340:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.409574 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 03:47:32.444586 initrd-setup-root-after-ignition[1083]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 03:47:32.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.512455 kernel: audit: type=1130 audit(1734061652.454:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.409898 systemd[1]: Starting ignition-quench.service... Dec 13 03:47:32.633655 kernel: audit: type=1130 audit(1734061652.520:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.633745 kernel: audit: type=1131 audit(1734061652.520:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.426703 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 03:47:32.454712 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 03:47:32.454785 systemd[1]: Finished ignition-quench.service. Dec 13 03:47:32.789567 kernel: audit: type=1130 audit(1734061652.675:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.789581 kernel: audit: type=1131 audit(1734061652.675:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.520622 systemd[1]: Reached target ignition-complete.target. Dec 13 03:47:32.642946 systemd[1]: Starting initrd-parse-etc.service... Dec 13 03:47:32.664135 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 03:47:32.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.664184 systemd[1]: Finished initrd-parse-etc.service. Dec 13 03:47:32.907578 kernel: audit: type=1130 audit(1734061652.836:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.675630 systemd[1]: Reached target initrd-fs.target. Dec 13 03:47:32.797570 systemd[1]: Reached target initrd.target. Dec 13 03:47:32.797626 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 03:47:32.797974 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 03:47:32.818691 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 03:47:32.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.837212 systemd[1]: Starting initrd-cleanup.service... Dec 13 03:47:33.053563 kernel: audit: type=1131 audit(1734061652.975:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:32.903298 systemd[1]: Stopped target nss-lookup.target. Dec 13 03:47:32.916617 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 03:47:32.933598 systemd[1]: Stopped target timers.target. Dec 13 03:47:32.958750 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 03:47:32.958870 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 03:47:32.975846 systemd[1]: Stopped target initrd.target. Dec 13 03:47:33.046588 systemd[1]: Stopped target basic.target. Dec 13 03:47:33.053660 systemd[1]: Stopped target ignition-complete.target. Dec 13 03:47:33.076649 systemd[1]: Stopped target ignition-diskful.target. Dec 13 03:47:33.093734 systemd[1]: Stopped target initrd-root-device.target. Dec 13 03:47:33.108668 systemd[1]: Stopped target remote-fs.target. Dec 13 03:47:33.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.125719 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 03:47:33.305577 kernel: audit: type=1131 audit(1734061653.218:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.140958 systemd[1]: Stopped target sysinit.target. Dec 13 03:47:33.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.155937 systemd[1]: Stopped target local-fs.target. Dec 13 03:47:33.390593 kernel: audit: type=1131 audit(1734061653.314:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.170930 systemd[1]: Stopped target local-fs-pre.target. Dec 13 03:47:33.186930 systemd[1]: Stopped target swap.target. Dec 13 03:47:33.201917 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 03:47:33.202282 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 03:47:33.219147 systemd[1]: Stopped target cryptsetup.target. Dec 13 03:47:33.296623 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 03:47:33.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.296707 systemd[1]: Stopped dracut-initqueue.service. Dec 13 03:47:33.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.314702 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 03:47:33.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.314772 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 03:47:33.533455 ignition[1098]: INFO : Ignition 2.14.0 Dec 13 03:47:33.533455 ignition[1098]: INFO : Stage: umount Dec 13 03:47:33.533455 ignition[1098]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:47:33.533455 ignition[1098]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:47:33.533455 ignition[1098]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:47:33.533455 ignition[1098]: INFO : umount: umount passed Dec 13 03:47:33.533455 ignition[1098]: INFO : POST message to Packet Timeline Dec 13 03:47:33.533455 ignition[1098]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:47:33.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.383755 systemd[1]: Stopped target paths.target. Dec 13 03:47:33.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.397583 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 03:47:33.401529 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 03:47:33.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:33.404669 systemd[1]: Stopped target slices.target. Dec 13 03:47:33.426730 systemd[1]: Stopped target sockets.target. Dec 13 03:47:33.443675 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 03:47:33.443762 systemd[1]: Closed iscsid.socket. Dec 13 03:47:33.457838 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 03:47:33.458003 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 03:47:33.476029 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 03:47:33.476389 systemd[1]: Stopped ignition-files.service. Dec 13 03:47:33.494036 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 03:47:33.494411 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 03:47:33.511020 systemd[1]: Stopping ignition-mount.service... Dec 13 03:47:33.526187 systemd[1]: Stopping iscsiuio.service... Dec 13 03:47:33.540555 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 03:47:33.540636 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 03:47:33.561289 systemd[1]: Stopping sysroot-boot.service... Dec 13 03:47:33.571519 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 03:47:33.571652 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 03:47:33.604046 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 03:47:33.604394 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 03:47:33.628103 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 03:47:33.628438 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 03:47:33.628487 systemd[1]: Stopped iscsiuio.service. Dec 13 03:47:33.637744 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 03:47:33.637788 systemd[1]: Stopped sysroot-boot.service. Dec 13 03:47:33.660835 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 03:47:33.660907 systemd[1]: Closed iscsiuio.socket. Dec 13 03:47:33.675786 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 03:47:33.675875 systemd[1]: Finished initrd-cleanup.service. Dec 13 03:47:35.102632 ignition[1098]: INFO : GET result: OK Dec 13 03:47:35.454729 ignition[1098]: INFO : Ignition finished successfully Dec 13 03:47:35.457496 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 03:47:35.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.457733 systemd[1]: Stopped ignition-mount.service. Dec 13 03:47:35.471841 systemd[1]: Stopped target network.target. Dec 13 03:47:35.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.488559 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 03:47:35.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.488697 systemd[1]: Stopped ignition-disks.service. Dec 13 03:47:35.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.504662 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 03:47:35.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.504786 systemd[1]: Stopped ignition-kargs.service. Dec 13 03:47:35.519756 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 03:47:35.519905 systemd[1]: Stopped ignition-setup.service. Dec 13 03:47:35.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.536753 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 03:47:35.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.613000 audit: BPF prog-id=6 op=UNLOAD Dec 13 03:47:35.536902 systemd[1]: Stopped initrd-setup-root.service. Dec 13 03:47:35.552059 systemd[1]: Stopping systemd-networkd.service... Dec 13 03:47:35.557464 systemd-networkd[875]: enp1s0f0np0: DHCPv6 lease lost Dec 13 03:47:35.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.565534 systemd-networkd[875]: enp1s0f1np1: DHCPv6 lease lost Dec 13 03:47:35.667000 audit: BPF prog-id=9 op=UNLOAD Dec 13 03:47:35.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.566866 systemd[1]: Stopping systemd-resolved.service... Dec 13 03:47:35.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.581232 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 03:47:35.581500 systemd[1]: Stopped systemd-resolved.service. Dec 13 03:47:35.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.597367 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 03:47:35.597615 systemd[1]: Stopped systemd-networkd.service. Dec 13 03:47:35.612698 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 03:47:35.612716 systemd[1]: Closed systemd-networkd.socket. Dec 13 03:47:35.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.630958 systemd[1]: Stopping network-cleanup.service... Dec 13 03:47:35.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.637642 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 03:47:35.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.637676 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 03:47:35.659737 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 03:47:35.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.659806 systemd[1]: Stopped systemd-sysctl.service. Dec 13 03:47:35.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.675797 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 03:47:35.675901 systemd[1]: Stopped systemd-modules-load.service. Dec 13 03:47:35.694981 systemd[1]: Stopping systemd-udevd.service... Dec 13 03:47:35.713331 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 03:47:35.714506 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 03:47:35.714565 systemd[1]: Stopped systemd-udevd.service. Dec 13 03:47:35.727039 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 03:47:35.727069 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 03:47:35.741690 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 03:47:35.741789 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 03:47:35.758626 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 03:47:35.758661 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 03:47:35.780463 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 03:47:35.780493 systemd[1]: Stopped dracut-cmdline.service. Dec 13 03:47:35.796539 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 03:47:35.796597 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 03:47:36.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:35.812536 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 03:47:35.829408 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 03:47:35.829436 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 03:47:35.844520 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 03:47:35.844755 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 03:47:35.992757 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 03:47:35.992997 systemd[1]: Stopped network-cleanup.service. Dec 13 03:47:36.005865 systemd[1]: Reached target initrd-switch-root.target. Dec 13 03:47:36.115819 iscsid[900]: iscsid shutting down. Dec 13 03:47:36.022240 systemd[1]: Starting initrd-switch-root.service... Dec 13 03:47:36.060185 systemd[1]: Switching root. Dec 13 03:47:36.115963 systemd-journald[267]: Journal stopped Dec 13 03:47:40.179577 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Dec 13 03:47:40.179591 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 03:47:40.179599 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 03:47:40.179605 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 03:47:40.179610 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 03:47:40.179615 kernel: SELinux: policy capability open_perms=1 Dec 13 03:47:40.179621 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 03:47:40.179626 kernel: SELinux: policy capability always_check_network=0 Dec 13 03:47:40.179631 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 03:47:40.179637 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 03:47:40.179642 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 03:47:40.179647 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 03:47:40.179653 systemd[1]: Successfully loaded SELinux policy in 321.093ms. Dec 13 03:47:40.179659 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 17.218ms. Dec 13 03:47:40.179667 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 03:47:40.179674 systemd[1]: Detected architecture x86-64. Dec 13 03:47:40.179679 systemd[1]: Detected first boot. Dec 13 03:47:40.179685 systemd[1]: Hostname set to . Dec 13 03:47:40.179691 systemd[1]: Initializing machine ID from random generator. Dec 13 03:47:40.179697 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 03:47:40.179703 systemd[1]: Populated /etc with preset unit settings. Dec 13 03:47:40.179710 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:47:40.179717 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:47:40.179724 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:47:40.179730 kernel: kauditd_printk_skb: 48 callbacks suppressed Dec 13 03:47:40.179735 kernel: audit: type=1334 audit(1734061658.480:91): prog-id=12 op=LOAD Dec 13 03:47:40.179741 kernel: audit: type=1334 audit(1734061658.480:92): prog-id=3 op=UNLOAD Dec 13 03:47:40.179747 kernel: audit: type=1334 audit(1734061658.526:93): prog-id=13 op=LOAD Dec 13 03:47:40.179752 kernel: audit: type=1334 audit(1734061658.571:94): prog-id=14 op=LOAD Dec 13 03:47:40.179758 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 03:47:40.179764 kernel: audit: type=1334 audit(1734061658.571:95): prog-id=4 op=UNLOAD Dec 13 03:47:40.179769 kernel: audit: type=1334 audit(1734061658.571:96): prog-id=5 op=UNLOAD Dec 13 03:47:40.179775 kernel: audit: type=1131 audit(1734061658.572:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.179780 systemd[1]: Stopped iscsid.service. Dec 13 03:47:40.179786 kernel: audit: type=1334 audit(1734061658.728:98): prog-id=12 op=UNLOAD Dec 13 03:47:40.179792 kernel: audit: type=1131 audit(1734061658.740:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.179798 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 03:47:40.179805 systemd[1]: Stopped initrd-switch-root.service. Dec 13 03:47:40.179811 kernel: audit: type=1130 audit(1734061658.847:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.179817 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 03:47:40.179824 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 03:47:40.179831 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 03:47:40.179837 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 03:47:40.179844 systemd[1]: Created slice system-getty.slice. Dec 13 03:47:40.179850 systemd[1]: Created slice system-modprobe.slice. Dec 13 03:47:40.179857 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 03:47:40.179863 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 03:47:40.179869 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 03:47:40.179875 systemd[1]: Created slice user.slice. Dec 13 03:47:40.179881 systemd[1]: Started systemd-ask-password-console.path. Dec 13 03:47:40.179888 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 03:47:40.179895 systemd[1]: Set up automount boot.automount. Dec 13 03:47:40.179902 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 03:47:40.179908 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 03:47:40.179914 systemd[1]: Stopped target initrd-fs.target. Dec 13 03:47:40.179920 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 03:47:40.179926 systemd[1]: Reached target integritysetup.target. Dec 13 03:47:40.179933 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 03:47:40.179939 systemd[1]: Reached target remote-fs.target. Dec 13 03:47:40.179946 systemd[1]: Reached target slices.target. Dec 13 03:47:40.179952 systemd[1]: Reached target swap.target. Dec 13 03:47:40.179959 systemd[1]: Reached target torcx.target. Dec 13 03:47:40.179965 systemd[1]: Reached target veritysetup.target. Dec 13 03:47:40.179971 systemd[1]: Listening on systemd-coredump.socket. Dec 13 03:47:40.179978 systemd[1]: Listening on systemd-initctl.socket. Dec 13 03:47:40.179985 systemd[1]: Listening on systemd-networkd.socket. Dec 13 03:47:40.179991 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 03:47:40.179998 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 03:47:40.180004 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 03:47:40.180010 systemd[1]: Mounting dev-hugepages.mount... Dec 13 03:47:40.180017 systemd[1]: Mounting dev-mqueue.mount... Dec 13 03:47:40.180023 systemd[1]: Mounting media.mount... Dec 13 03:47:40.180030 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:47:40.180037 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 03:47:40.180043 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 03:47:40.180049 systemd[1]: Mounting tmp.mount... Dec 13 03:47:40.180056 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 03:47:40.180062 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:47:40.180069 systemd[1]: Starting kmod-static-nodes.service... Dec 13 03:47:40.180075 systemd[1]: Starting modprobe@configfs.service... Dec 13 03:47:40.180081 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:47:40.180087 systemd[1]: Starting modprobe@drm.service... Dec 13 03:47:40.180094 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:47:40.180101 systemd[1]: Starting modprobe@fuse.service... Dec 13 03:47:40.180107 kernel: fuse: init (API version 7.34) Dec 13 03:47:40.180113 systemd[1]: Starting modprobe@loop.service... Dec 13 03:47:40.180119 kernel: loop: module loaded Dec 13 03:47:40.180125 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 03:47:40.180131 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 03:47:40.180138 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 03:47:40.180144 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 03:47:40.180151 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 03:47:40.180158 systemd[1]: Stopped systemd-journald.service. Dec 13 03:47:40.180164 systemd[1]: Starting systemd-journald.service... Dec 13 03:47:40.180170 systemd[1]: Starting systemd-modules-load.service... Dec 13 03:47:40.180179 systemd-journald[1249]: Journal started Dec 13 03:47:40.180204 systemd-journald[1249]: Runtime Journal (/run/log/journal/a7c50a071f4b4aa7949107fde9224979) is 8.0M, max 640.1M, 632.1M free. Dec 13 03:47:36.547000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 03:47:36.840000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 03:47:36.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 03:47:36.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 03:47:36.842000 audit: BPF prog-id=10 op=LOAD Dec 13 03:47:36.842000 audit: BPF prog-id=10 op=UNLOAD Dec 13 03:47:36.842000 audit: BPF prog-id=11 op=LOAD Dec 13 03:47:36.842000 audit: BPF prog-id=11 op=UNLOAD Dec 13 03:47:36.920000 audit[1139]: AVC avc: denied { associate } for pid=1139 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 03:47:36.920000 audit[1139]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1122 pid=1139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:47:36.920000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 03:47:36.945000 audit[1139]: AVC avc: denied { associate } for pid=1139 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 03:47:36.945000 audit[1139]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=1122 pid=1139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:47:36.945000 audit: CWD cwd="/" Dec 13 03:47:36.945000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:36.945000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:36.945000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 03:47:38.480000 audit: BPF prog-id=12 op=LOAD Dec 13 03:47:38.480000 audit: BPF prog-id=3 op=UNLOAD Dec 13 03:47:38.526000 audit: BPF prog-id=13 op=LOAD Dec 13 03:47:38.571000 audit: BPF prog-id=14 op=LOAD Dec 13 03:47:38.571000 audit: BPF prog-id=4 op=UNLOAD Dec 13 03:47:38.571000 audit: BPF prog-id=5 op=UNLOAD Dec 13 03:47:38.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:38.728000 audit: BPF prog-id=12 op=UNLOAD Dec 13 03:47:38.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:38.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:38.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.151000 audit: BPF prog-id=15 op=LOAD Dec 13 03:47:40.152000 audit: BPF prog-id=16 op=LOAD Dec 13 03:47:40.152000 audit: BPF prog-id=17 op=LOAD Dec 13 03:47:40.152000 audit: BPF prog-id=13 op=UNLOAD Dec 13 03:47:40.152000 audit: BPF prog-id=14 op=UNLOAD Dec 13 03:47:40.177000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 03:47:40.177000 audit[1249]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffee37751e0 a2=4000 a3=7ffee377527c items=0 ppid=1 pid=1249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:47:40.177000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 03:47:36.918385 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:47:38.479084 systemd[1]: Queued start job for default target multi-user.target. Dec 13 03:47:36.918853 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 03:47:38.572707 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 03:47:36.918865 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 03:47:36.918884 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 03:47:36.918890 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 03:47:36.918906 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 03:47:36.918913 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 03:47:36.919028 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 03:47:36.919049 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 03:47:36.919056 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 03:47:36.919810 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 03:47:36.919830 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 03:47:36.919840 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 03:47:36.919848 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 03:47:36.919857 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 03:47:36.919865 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 03:47:38.130165 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:38Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:47:38.130311 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:38Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:47:38.130372 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:38Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:47:38.130504 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:38Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:47:38.130534 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:38Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 03:47:38.130567 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:47:38Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 03:47:40.210538 systemd[1]: Starting systemd-network-generator.service... Dec 13 03:47:40.232390 systemd[1]: Starting systemd-remount-fs.service... Dec 13 03:47:40.254399 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 03:47:40.286943 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 03:47:40.286964 systemd[1]: Stopped verity-setup.service. Dec 13 03:47:40.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.321389 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:47:40.336551 systemd[1]: Started systemd-journald.service. Dec 13 03:47:40.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.344004 systemd[1]: Mounted dev-hugepages.mount. Dec 13 03:47:40.351635 systemd[1]: Mounted dev-mqueue.mount. Dec 13 03:47:40.359630 systemd[1]: Mounted media.mount. Dec 13 03:47:40.366627 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 03:47:40.375618 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 03:47:40.384611 systemd[1]: Mounted tmp.mount. Dec 13 03:47:40.391683 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 03:47:40.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.400710 systemd[1]: Finished kmod-static-nodes.service. Dec 13 03:47:40.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.409754 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 03:47:40.409882 systemd[1]: Finished modprobe@configfs.service. Dec 13 03:47:40.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.418802 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:47:40.418945 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:47:40.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.427927 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 03:47:40.428124 systemd[1]: Finished modprobe@drm.service. Dec 13 03:47:40.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.437201 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:47:40.437537 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:47:40.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.446183 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 03:47:40.446505 systemd[1]: Finished modprobe@fuse.service. Dec 13 03:47:40.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.455165 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:47:40.455484 systemd[1]: Finished modprobe@loop.service. Dec 13 03:47:40.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.464193 systemd[1]: Finished systemd-modules-load.service. Dec 13 03:47:40.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.473155 systemd[1]: Finished systemd-network-generator.service. Dec 13 03:47:40.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.482140 systemd[1]: Finished systemd-remount-fs.service. Dec 13 03:47:40.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.491144 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 03:47:40.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.500760 systemd[1]: Reached target network-pre.target. Dec 13 03:47:40.512170 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 03:47:40.521057 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 03:47:40.528564 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 03:47:40.529600 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 03:47:40.537026 systemd[1]: Starting systemd-journal-flush.service... Dec 13 03:47:40.541120 systemd-journald[1249]: Time spent on flushing to /var/log/journal/a7c50a071f4b4aa7949107fde9224979 is 15.581ms for 1564 entries. Dec 13 03:47:40.541120 systemd-journald[1249]: System Journal (/var/log/journal/a7c50a071f4b4aa7949107fde9224979) is 8.0M, max 195.6M, 187.6M free. Dec 13 03:47:40.577101 systemd-journald[1249]: Received client request to flush runtime journal. Dec 13 03:47:40.553476 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:47:40.554063 systemd[1]: Starting systemd-random-seed.service... Dec 13 03:47:40.565452 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:47:40.565967 systemd[1]: Starting systemd-sysctl.service... Dec 13 03:47:40.573940 systemd[1]: Starting systemd-sysusers.service... Dec 13 03:47:40.582013 systemd[1]: Starting systemd-udev-settle.service... Dec 13 03:47:40.589692 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 03:47:40.597526 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 03:47:40.605568 systemd[1]: Finished systemd-journal-flush.service. Dec 13 03:47:40.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.613603 systemd[1]: Finished systemd-random-seed.service. Dec 13 03:47:40.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.621595 systemd[1]: Finished systemd-sysctl.service. Dec 13 03:47:40.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.629602 systemd[1]: Finished systemd-sysusers.service. Dec 13 03:47:40.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.638568 systemd[1]: Reached target first-boot-complete.target. Dec 13 03:47:40.646684 udevadm[1267]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 03:47:40.835511 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 03:47:40.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.844000 audit: BPF prog-id=18 op=LOAD Dec 13 03:47:40.845000 audit: BPF prog-id=19 op=LOAD Dec 13 03:47:40.845000 audit: BPF prog-id=7 op=UNLOAD Dec 13 03:47:40.845000 audit: BPF prog-id=8 op=UNLOAD Dec 13 03:47:40.845770 systemd[1]: Starting systemd-udevd.service... Dec 13 03:47:40.857826 systemd-udevd[1268]: Using default interface naming scheme 'v252'. Dec 13 03:47:40.874225 systemd[1]: Started systemd-udevd.service. Dec 13 03:47:40.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:40.884911 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Dec 13 03:47:40.885000 audit: BPF prog-id=20 op=LOAD Dec 13 03:47:40.886057 systemd[1]: Starting systemd-networkd.service... Dec 13 03:47:40.907354 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Dec 13 03:47:40.907424 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 03:47:40.940447 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1331) Dec 13 03:47:40.940504 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 03:47:40.940000 audit: BPF prog-id=21 op=LOAD Dec 13 03:47:40.956000 audit: BPF prog-id=22 op=LOAD Dec 13 03:47:40.957000 audit: BPF prog-id=23 op=LOAD Dec 13 03:47:40.964593 systemd[1]: Starting systemd-userdbd.service... Dec 13 03:47:40.972346 kernel: IPMI message handler: version 39.2 Dec 13 03:47:40.972376 kernel: ACPI: button: Power Button [PWRF] Dec 13 03:47:40.927000 audit[1270]: AVC avc: denied { confidentiality } for pid=1270 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 03:47:41.020966 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 03:47:41.022120 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Dec 13 03:47:41.068709 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Dec 13 03:47:41.068836 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 03:47:41.068859 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Dec 13 03:47:41.068998 kernel: ipmi device interface Dec 13 03:47:40.927000 audit[1270]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55df6cb8c590 a1=4d98c a2=7f576ea59bc5 a3=5 items=42 ppid=1268 pid=1270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:47:40.927000 audit: CWD cwd="/" Dec 13 03:47:40.927000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=1 name=(null) inode=19748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=2 name=(null) inode=19748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=3 name=(null) inode=19749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=4 name=(null) inode=19748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=5 name=(null) inode=19750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=6 name=(null) inode=19748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=7 name=(null) inode=19751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=8 name=(null) inode=19751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=9 name=(null) inode=19752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=10 name=(null) inode=19751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=11 name=(null) inode=19753 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=12 name=(null) inode=19751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=13 name=(null) inode=19754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=14 name=(null) inode=19751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=15 name=(null) inode=19755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=16 name=(null) inode=19751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=17 name=(null) inode=19756 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=18 name=(null) inode=19748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=19 name=(null) inode=19757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=20 name=(null) inode=19757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=21 name=(null) inode=19758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=22 name=(null) inode=19757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=23 name=(null) inode=19759 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=24 name=(null) inode=19757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=25 name=(null) inode=19760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=26 name=(null) inode=19757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=27 name=(null) inode=19761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=28 name=(null) inode=19757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=29 name=(null) inode=19762 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=30 name=(null) inode=19748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=31 name=(null) inode=19763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=32 name=(null) inode=19763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=33 name=(null) inode=19764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=34 name=(null) inode=19763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=35 name=(null) inode=19765 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=36 name=(null) inode=19763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=37 name=(null) inode=19766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=38 name=(null) inode=19763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=39 name=(null) inode=19767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=40 name=(null) inode=19763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PATH item=41 name=(null) inode=19768 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:47:40.927000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 03:47:41.084395 systemd[1]: Started systemd-userdbd.service. Dec 13 03:47:41.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:41.098347 kernel: iTCO_vendor_support: vendor-support=0 Dec 13 03:47:41.098381 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Dec 13 03:47:41.139457 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Dec 13 03:47:41.139586 kernel: ipmi_si: IPMI System Interface driver Dec 13 03:47:41.170344 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Dec 13 03:47:41.203523 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Dec 13 03:47:41.203539 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Dec 13 03:47:41.203551 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Dec 13 03:47:41.316337 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Dec 13 03:47:41.316664 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Dec 13 03:47:41.316932 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Dec 13 03:47:41.317133 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Dec 13 03:47:41.317290 kernel: ipmi_si: Adding ACPI-specified kcs state machine Dec 13 03:47:41.317319 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Dec 13 03:47:41.364500 systemd-networkd[1308]: bond0: netdev ready Dec 13 03:47:41.366825 systemd-networkd[1308]: lo: Link UP Dec 13 03:47:41.366828 systemd-networkd[1308]: lo: Gained carrier Dec 13 03:47:41.367299 systemd-networkd[1308]: Enumeration completed Dec 13 03:47:41.367359 systemd[1]: Started systemd-networkd.service. Dec 13 03:47:41.367592 systemd-networkd[1308]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Dec 13 03:47:41.379582 systemd-networkd[1308]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:42:7b:7d.network. Dec 13 03:47:41.393860 kernel: intel_rapl_common: Found RAPL domain package Dec 13 03:47:41.393886 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Dec 13 03:47:41.393994 kernel: intel_rapl_common: Found RAPL domain core Dec 13 03:47:41.432206 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Dec 13 03:47:41.432294 kernel: intel_rapl_common: Found RAPL domain dram Dec 13 03:47:41.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:41.507346 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Dec 13 03:47:41.525376 kernel: ipmi_ssif: IPMI SSIF Interface driver Dec 13 03:47:41.528612 systemd[1]: Finished systemd-udev-settle.service. Dec 13 03:47:41.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:41.538037 systemd[1]: Starting lvm2-activation-early.service... Dec 13 03:47:41.553221 lvm[1374]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 03:47:41.587751 systemd[1]: Finished lvm2-activation-early.service. Dec 13 03:47:41.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:41.596460 systemd[1]: Reached target cryptsetup.target. Dec 13 03:47:41.606073 systemd[1]: Starting lvm2-activation.service... Dec 13 03:47:41.608158 lvm[1375]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 03:47:41.641811 systemd[1]: Finished lvm2-activation.service. Dec 13 03:47:41.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:41.651448 systemd[1]: Reached target local-fs-pre.target. Dec 13 03:47:41.660394 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 03:47:41.660410 systemd[1]: Reached target local-fs.target. Dec 13 03:47:41.669395 systemd[1]: Reached target machines.target. Dec 13 03:47:41.679085 systemd[1]: Starting ldconfig.service... Dec 13 03:47:41.686047 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:47:41.686075 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:47:41.686607 systemd[1]: Starting systemd-boot-update.service... Dec 13 03:47:41.693851 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 03:47:41.703949 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 03:47:41.704674 systemd[1]: Starting systemd-sysext.service... Dec 13 03:47:41.704897 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1377 (bootctl) Dec 13 03:47:41.705628 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 03:47:41.718759 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 03:47:41.726022 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 03:47:41.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:41.732942 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 03:47:41.733023 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 03:47:41.770376 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 03:47:41.850635 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 03:47:41.850946 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 03:47:41.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:41.888347 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 03:47:41.897999 systemd-fsck[1386]: fsck.fat 4.2 (2021-01-31) Dec 13 03:47:41.897999 systemd-fsck[1386]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 03:47:41.899043 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 03:47:41.908377 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 03:47:41.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:41.930737 systemd[1]: Mounting boot.mount... Dec 13 03:47:41.933377 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Dec 13 03:47:41.934664 systemd-networkd[1308]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:42:7b:7c.network. Dec 13 03:47:41.942577 systemd[1]: Mounted boot.mount. Dec 13 03:47:41.965346 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 03:47:41.965613 systemd[1]: Finished systemd-boot-update.service. Dec 13 03:47:41.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:41.979624 (sd-sysext)[1391]: Using extensions 'kubernetes'. Dec 13 03:47:41.979805 (sd-sysext)[1391]: Merged extensions into '/usr'. Dec 13 03:47:41.989931 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:47:41.990668 systemd[1]: Mounting usr-share-oem.mount... Dec 13 03:47:42.006554 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:47:42.007186 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:47:42.016384 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 03:47:42.023910 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:47:42.030944 systemd[1]: Starting modprobe@loop.service... Dec 13 03:47:42.037576 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:47:42.037647 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:47:42.037712 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:47:42.039285 systemd[1]: Mounted usr-share-oem.mount. Dec 13 03:47:42.047648 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:47:42.047717 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:47:42.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:42.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:42.055660 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:47:42.055729 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:47:42.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:42.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:42.065706 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:47:42.066050 systemd[1]: Finished modprobe@loop.service. Dec 13 03:47:42.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:42.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:42.075955 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:47:42.076235 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:47:42.078927 systemd[1]: Finished systemd-sysext.service. Dec 13 03:47:42.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:42.093789 systemd[1]: Starting ensure-sysext.service... Dec 13 03:47:42.107375 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 03:47:42.121945 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 03:47:42.122608 ldconfig[1376]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 03:47:42.131343 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Dec 13 03:47:42.131370 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 03:47:42.131385 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Dec 13 03:47:42.172135 systemd-networkd[1308]: bond0: Link UP Dec 13 03:47:42.172325 systemd-networkd[1308]: enp1s0f1np1: Link UP Dec 13 03:47:42.178870 systemd-tmpfiles[1398]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 03:47:42.181948 systemd-tmpfiles[1398]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 03:47:42.186255 systemd-tmpfiles[1398]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 03:47:42.187977 systemd[1]: Finished ldconfig.service. Dec 13 03:47:42.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:42.208063 systemd[1]: Reloading. Dec 13 03:47:42.210961 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Dec 13 03:47:42.210980 kernel: bond0: active interface up! Dec 13 03:47:42.232248 systemd-networkd[1308]: enp1s0f1np1: Gained carrier Dec 13 03:47:42.232343 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Dec 13 03:47:42.233255 systemd-networkd[1308]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:42:7b:7c.network. Dec 13 03:47:42.239935 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T03:47:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:47:42.239955 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T03:47:42Z" level=info msg="torcx already run" Dec 13 03:47:42.279391 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 03:47:42.298499 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:47:42.298506 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:47:42.309607 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:47:42.333526 systemd-networkd[1308]: enp1s0f0np0: Link UP Dec 13 03:47:42.333702 systemd-networkd[1308]: bond0: Gained carrier Dec 13 03:47:42.333791 systemd-networkd[1308]: enp1s0f0np0: Gained carrier Dec 13 03:47:42.376333 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:47:42.376374 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Dec 13 03:47:42.375000 audit: BPF prog-id=24 op=LOAD Dec 13 03:47:42.375000 audit: BPF prog-id=15 op=UNLOAD Dec 13 03:47:42.376453 systemd-networkd[1308]: enp1s0f1np1: Link DOWN Dec 13 03:47:42.376000 audit: BPF prog-id=25 op=LOAD Dec 13 03:47:42.376456 systemd-networkd[1308]: enp1s0f1np1: Lost carrier Dec 13 03:47:42.376000 audit: BPF prog-id=26 op=LOAD Dec 13 03:47:42.376000 audit: BPF prog-id=16 op=UNLOAD Dec 13 03:47:42.376000 audit: BPF prog-id=17 op=UNLOAD Dec 13 03:47:42.377000 audit: BPF prog-id=27 op=LOAD Dec 13 03:47:42.377000 audit: BPF prog-id=20 op=UNLOAD Dec 13 03:47:42.377000 audit: BPF prog-id=28 op=LOAD Dec 13 03:47:42.377000 audit: BPF prog-id=21 op=UNLOAD Dec 13 03:47:42.377000 audit: BPF prog-id=29 op=LOAD Dec 13 03:47:42.377000 audit: BPF prog-id=30 op=LOAD Dec 13 03:47:42.377000 audit: BPF prog-id=22 op=UNLOAD Dec 13 03:47:42.377000 audit: BPF prog-id=23 op=UNLOAD Dec 13 03:47:42.378000 audit: BPF prog-id=31 op=LOAD Dec 13 03:47:42.378000 audit: BPF prog-id=32 op=LOAD Dec 13 03:47:42.378000 audit: BPF prog-id=18 op=UNLOAD Dec 13 03:47:42.378000 audit: BPF prog-id=19 op=UNLOAD Dec 13 03:47:42.379866 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 03:47:42.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:42.390227 systemd[1]: Starting audit-rules.service... Dec 13 03:47:42.397916 systemd[1]: Starting clean-ca-certificates.service... Dec 13 03:47:42.407014 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 03:47:42.408000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 03:47:42.408000 audit[1496]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc74980590 a2=420 a3=0 items=0 ppid=1479 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:47:42.408000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 03:47:42.409060 augenrules[1496]: No rules Dec 13 03:47:42.416320 systemd[1]: Starting systemd-resolved.service... Dec 13 03:47:42.424332 systemd[1]: Starting systemd-timesyncd.service... Dec 13 03:47:42.431907 systemd[1]: Starting systemd-update-utmp.service... Dec 13 03:47:42.438665 systemd[1]: Finished audit-rules.service. Dec 13 03:47:42.445496 systemd[1]: Finished clean-ca-certificates.service. Dec 13 03:47:42.453487 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 03:47:42.466529 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:47:42.467219 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:47:42.473935 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:47:42.480910 systemd[1]: Starting modprobe@loop.service... Dec 13 03:47:42.487394 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:47:42.487486 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:47:42.488198 systemd[1]: Starting systemd-update-done.service... Dec 13 03:47:42.494080 systemd-resolved[1501]: Positive Trust Anchors: Dec 13 03:47:42.494085 systemd-resolved[1501]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 03:47:42.494103 systemd-resolved[1501]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 03:47:42.494393 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 03:47:42.495179 systemd[1]: Started systemd-timesyncd.service. Dec 13 03:47:42.500047 systemd-resolved[1501]: Using system hostname 'ci-3510.3.6-a-bb67cfe667'. Dec 13 03:47:42.503914 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:47:42.503984 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:47:42.512633 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:47:42.512695 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:47:42.521645 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:47:42.521711 systemd[1]: Finished modprobe@loop.service. Dec 13 03:47:42.529610 systemd[1]: Finished systemd-update-done.service. Dec 13 03:47:42.537682 systemd[1]: Reached target time-set.target. Dec 13 03:47:42.555345 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 03:47:42.569425 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:47:42.569481 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:47:42.569719 systemd[1]: Finished systemd-update-utmp.service. Dec 13 03:47:42.575354 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Dec 13 03:47:42.576371 systemd-networkd[1308]: enp1s0f1np1: Link UP Dec 13 03:47:42.576510 systemd-timesyncd[1502]: Network configuration changed, trying to establish connection. Dec 13 03:47:42.576537 systemd-networkd[1308]: enp1s0f1np1: Gained carrier Dec 13 03:47:42.576547 systemd-timesyncd[1502]: Network configuration changed, trying to establish connection. Dec 13 03:47:42.583512 systemd[1]: Started systemd-resolved.service. Dec 13 03:47:42.599528 systemd[1]: Reached target network.target. Dec 13 03:47:42.605391 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Dec 13 03:47:42.605420 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Dec 13 03:47:42.606594 systemd-timesyncd[1502]: Network configuration changed, trying to establish connection. Dec 13 03:47:42.606628 systemd-timesyncd[1502]: Network configuration changed, trying to establish connection. Dec 13 03:47:42.621422 systemd[1]: Reached target nss-lookup.target. Dec 13 03:47:42.625767 systemd-timesyncd[1502]: Network configuration changed, trying to establish connection. Dec 13 03:47:42.633506 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:47:42.634177 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:47:42.640929 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:47:42.647909 systemd[1]: Starting modprobe@loop.service... Dec 13 03:47:42.654424 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:47:42.654488 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:47:42.654544 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 03:47:42.655054 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:47:42.655120 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:47:42.663569 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:47:42.663627 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:47:42.671553 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:47:42.671610 systemd[1]: Finished modprobe@loop.service. Dec 13 03:47:42.679557 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:47:42.679626 systemd[1]: Reached target sysinit.target. Dec 13 03:47:42.687456 systemd[1]: Started motdgen.path. Dec 13 03:47:42.694439 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 03:47:42.704495 systemd[1]: Started logrotate.timer. Dec 13 03:47:42.711464 systemd[1]: Started mdadm.timer. Dec 13 03:47:42.718426 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 03:47:42.726395 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 03:47:42.726455 systemd[1]: Reached target paths.target. Dec 13 03:47:42.733414 systemd[1]: Reached target timers.target. Dec 13 03:47:42.740544 systemd[1]: Listening on dbus.socket. Dec 13 03:47:42.747903 systemd[1]: Starting docker.socket... Dec 13 03:47:42.755800 systemd[1]: Listening on sshd.socket. Dec 13 03:47:42.762486 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:47:42.762550 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:47:42.764133 systemd[1]: Listening on docker.socket. Dec 13 03:47:42.771261 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 03:47:42.771320 systemd[1]: Reached target sockets.target. Dec 13 03:47:42.779460 systemd[1]: Reached target basic.target. Dec 13 03:47:42.786437 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:47:42.786487 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 03:47:42.786536 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 03:47:42.787075 systemd[1]: Starting containerd.service... Dec 13 03:47:42.793899 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 03:47:42.803065 systemd[1]: Starting coreos-metadata.service... Dec 13 03:47:42.809942 systemd[1]: Starting dbus.service... Dec 13 03:47:42.815962 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 03:47:42.820247 jq[1522]: false Dec 13 03:47:42.822342 coreos-metadata[1515]: Dec 13 03:47:42.822 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:47:42.822945 systemd[1]: Starting extend-filesystems.service... Dec 13 03:47:42.828697 dbus-daemon[1521]: [system] SELinux support is enabled Dec 13 03:47:42.829405 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 03:47:42.830115 systemd[1]: Starting modprobe@drm.service... Dec 13 03:47:42.830408 extend-filesystems[1524]: Found loop1 Dec 13 03:47:42.830408 extend-filesystems[1524]: Found sda Dec 13 03:47:42.858313 extend-filesystems[1524]: Found sda1 Dec 13 03:47:42.858313 extend-filesystems[1524]: Found sda2 Dec 13 03:47:42.858313 extend-filesystems[1524]: Found sda3 Dec 13 03:47:42.858313 extend-filesystems[1524]: Found usr Dec 13 03:47:42.858313 extend-filesystems[1524]: Found sda4 Dec 13 03:47:42.858313 extend-filesystems[1524]: Found sda6 Dec 13 03:47:42.858313 extend-filesystems[1524]: Found sda7 Dec 13 03:47:42.858313 extend-filesystems[1524]: Found sda9 Dec 13 03:47:42.858313 extend-filesystems[1524]: Checking size of /dev/sda9 Dec 13 03:47:42.858313 extend-filesystems[1524]: Resized partition /dev/sda9 Dec 13 03:47:42.976393 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Dec 13 03:47:42.976448 coreos-metadata[1518]: Dec 13 03:47:42.833 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:47:42.837154 systemd[1]: Starting motdgen.service... Dec 13 03:47:42.976650 extend-filesystems[1533]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 03:47:42.870204 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 03:47:42.883996 systemd[1]: Starting sshd-keygen.service... Dec 13 03:47:42.891090 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 03:47:42.909372 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:47:42.910009 systemd[1]: Starting tcsd.service... Dec 13 03:47:42.991762 update_engine[1552]: I1213 03:47:42.970753 1552 main.cc:92] Flatcar Update Engine starting Dec 13 03:47:42.991762 update_engine[1552]: I1213 03:47:42.974231 1552 update_check_scheduler.cc:74] Next update check in 6m32s Dec 13 03:47:42.927686 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 03:47:42.991952 jq[1553]: true Dec 13 03:47:42.928084 systemd[1]: Starting update-engine.service... Dec 13 03:47:42.945944 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 03:47:42.967372 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:47:42.968460 systemd[1]: Started dbus.service. Dec 13 03:47:42.985105 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 03:47:42.985197 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 03:47:42.985424 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 03:47:42.985489 systemd[1]: Finished modprobe@drm.service. Dec 13 03:47:42.999710 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 03:47:42.999796 systemd[1]: Finished motdgen.service. Dec 13 03:47:43.006604 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 03:47:43.006676 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 03:47:43.017161 jq[1555]: true Dec 13 03:47:43.017553 systemd[1]: Finished ensure-sysext.service. Dec 13 03:47:43.026053 env[1556]: time="2024-12-13T03:47:43.025998887Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 03:47:43.031896 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Dec 13 03:47:43.031984 systemd[1]: Condition check resulted in tcsd.service being skipped. Dec 13 03:47:43.034782 systemd[1]: Started update-engine.service. Dec 13 03:47:43.034990 env[1556]: time="2024-12-13T03:47:43.034971570Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 03:47:43.035054 env[1556]: time="2024-12-13T03:47:43.035046471Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:47:43.035606 env[1556]: time="2024-12-13T03:47:43.035591967Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:47:43.035629 env[1556]: time="2024-12-13T03:47:43.035606109Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:47:43.035719 env[1556]: time="2024-12-13T03:47:43.035709645Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:47:43.035743 env[1556]: time="2024-12-13T03:47:43.035719741Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 03:47:43.035743 env[1556]: time="2024-12-13T03:47:43.035726760Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 03:47:43.035743 env[1556]: time="2024-12-13T03:47:43.035732382Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 03:47:43.035788 env[1556]: time="2024-12-13T03:47:43.035776972Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:47:43.035905 env[1556]: time="2024-12-13T03:47:43.035897604Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:47:43.035975 env[1556]: time="2024-12-13T03:47:43.035966457Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:47:43.035997 env[1556]: time="2024-12-13T03:47:43.035976487Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 03:47:43.036018 env[1556]: time="2024-12-13T03:47:43.036002804Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 03:47:43.036018 env[1556]: time="2024-12-13T03:47:43.036010668Z" level=info msg="metadata content store policy set" policy=shared Dec 13 03:47:43.044684 systemd[1]: Started locksmithd.service. Dec 13 03:47:43.051417 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 03:47:43.051434 systemd[1]: Reached target system-config.target. Dec 13 03:47:43.052225 env[1556]: time="2024-12-13T03:47:43.052213988Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 03:47:43.052256 env[1556]: time="2024-12-13T03:47:43.052230863Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 03:47:43.052256 env[1556]: time="2024-12-13T03:47:43.052239087Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 03:47:43.052295 env[1556]: time="2024-12-13T03:47:43.052256140Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 03:47:43.052295 env[1556]: time="2024-12-13T03:47:43.052264307Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 03:47:43.052295 env[1556]: time="2024-12-13T03:47:43.052272284Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 03:47:43.052295 env[1556]: time="2024-12-13T03:47:43.052279135Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 03:47:43.052295 env[1556]: time="2024-12-13T03:47:43.052286688Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 03:47:43.052295 env[1556]: time="2024-12-13T03:47:43.052294481Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 03:47:43.052396 env[1556]: time="2024-12-13T03:47:43.052302461Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 03:47:43.052396 env[1556]: time="2024-12-13T03:47:43.052309409Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 03:47:43.052396 env[1556]: time="2024-12-13T03:47:43.052315837Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 03:47:43.054833 env[1556]: time="2024-12-13T03:47:43.054823780Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 03:47:43.054882 env[1556]: time="2024-12-13T03:47:43.054875145Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 03:47:43.055014 env[1556]: time="2024-12-13T03:47:43.055007374Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 03:47:43.055033 env[1556]: time="2024-12-13T03:47:43.055022837Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055033 env[1556]: time="2024-12-13T03:47:43.055030196Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 03:47:43.055068 env[1556]: time="2024-12-13T03:47:43.055058236Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055068 env[1556]: time="2024-12-13T03:47:43.055066304Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055105 env[1556]: time="2024-12-13T03:47:43.055074038Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055105 env[1556]: time="2024-12-13T03:47:43.055080506Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055105 env[1556]: time="2024-12-13T03:47:43.055087128Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055105 env[1556]: time="2024-12-13T03:47:43.055093977Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055105 env[1556]: time="2024-12-13T03:47:43.055100278Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055194 env[1556]: time="2024-12-13T03:47:43.055106585Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055194 env[1556]: time="2024-12-13T03:47:43.055113600Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 03:47:43.055194 env[1556]: time="2024-12-13T03:47:43.055181793Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055194 env[1556]: time="2024-12-13T03:47:43.055191333Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055260 env[1556]: time="2024-12-13T03:47:43.055197830Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055260 env[1556]: time="2024-12-13T03:47:43.055206781Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 03:47:43.055260 env[1556]: time="2024-12-13T03:47:43.055217368Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 03:47:43.055260 env[1556]: time="2024-12-13T03:47:43.055223794Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 03:47:43.055260 env[1556]: time="2024-12-13T03:47:43.055234443Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 03:47:43.055260 env[1556]: time="2024-12-13T03:47:43.055257367Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 03:47:43.055435 env[1556]: time="2024-12-13T03:47:43.055370724Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 03:47:43.055435 env[1556]: time="2024-12-13T03:47:43.055407123Z" level=info msg="Connect containerd service" Dec 13 03:47:43.055435 env[1556]: time="2024-12-13T03:47:43.055426342Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 03:47:43.058886 env[1556]: time="2024-12-13T03:47:43.055692622Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 03:47:43.058886 env[1556]: time="2024-12-13T03:47:43.055991089Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 03:47:43.058886 env[1556]: time="2024-12-13T03:47:43.055966869Z" level=info msg="Start subscribing containerd event" Dec 13 03:47:43.058886 env[1556]: time="2024-12-13T03:47:43.056019698Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 03:47:43.058886 env[1556]: time="2024-12-13T03:47:43.056040459Z" level=info msg="Start recovering state" Dec 13 03:47:43.058886 env[1556]: time="2024-12-13T03:47:43.056053186Z" level=info msg="containerd successfully booted in 0.030418s" Dec 13 03:47:43.058886 env[1556]: time="2024-12-13T03:47:43.056082888Z" level=info msg="Start event monitor" Dec 13 03:47:43.058886 env[1556]: time="2024-12-13T03:47:43.056094592Z" level=info msg="Start snapshots syncer" Dec 13 03:47:43.058886 env[1556]: time="2024-12-13T03:47:43.056103118Z" level=info msg="Start cni network conf syncer for default" Dec 13 03:47:43.058886 env[1556]: time="2024-12-13T03:47:43.056107459Z" level=info msg="Start streaming server" Dec 13 03:47:43.059372 bash[1588]: Updated "/home/core/.ssh/authorized_keys" Dec 13 03:47:43.060678 systemd[1]: Starting systemd-logind.service... Dec 13 03:47:43.067434 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 03:47:43.067458 systemd[1]: Reached target user-config.target. Dec 13 03:47:43.075504 systemd[1]: Started containerd.service. Dec 13 03:47:43.082569 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 03:47:43.082753 systemd-logind[1591]: Watching system buttons on /dev/input/event3 (Power Button) Dec 13 03:47:43.082765 systemd-logind[1591]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 03:47:43.082777 systemd-logind[1591]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Dec 13 03:47:43.082880 systemd-logind[1591]: New seat seat0. Dec 13 03:47:43.092556 systemd[1]: Started systemd-logind.service. Dec 13 03:47:43.105458 locksmithd[1590]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 03:47:43.273437 systemd-networkd[1308]: bond0: Gained IPv6LL Dec 13 03:47:43.273649 systemd-timesyncd[1502]: Network configuration changed, trying to establish connection. Dec 13 03:47:43.339375 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Dec 13 03:47:43.368863 extend-filesystems[1533]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 03:47:43.368863 extend-filesystems[1533]: old_desc_blocks = 1, new_desc_blocks = 56 Dec 13 03:47:43.368863 extend-filesystems[1533]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Dec 13 03:47:43.408387 extend-filesystems[1524]: Resized filesystem in /dev/sda9 Dec 13 03:47:43.408387 extend-filesystems[1524]: Found sdb Dec 13 03:47:43.369342 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 03:47:43.369434 systemd[1]: Finished extend-filesystems.service. Dec 13 03:47:43.446344 sshd_keygen[1549]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 03:47:43.458214 systemd[1]: Finished sshd-keygen.service. Dec 13 03:47:43.466479 systemd[1]: Starting issuegen.service... Dec 13 03:47:43.473705 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 03:47:43.473780 systemd[1]: Finished issuegen.service. Dec 13 03:47:43.482293 systemd[1]: Starting systemd-user-sessions.service... Dec 13 03:47:43.490779 systemd[1]: Finished systemd-user-sessions.service. Dec 13 03:47:43.500067 systemd[1]: Started getty@tty1.service. Dec 13 03:47:43.508129 systemd[1]: Started serial-getty@ttyS1.service. Dec 13 03:47:43.516704 systemd[1]: Reached target getty.target. Dec 13 03:47:43.593589 systemd-timesyncd[1502]: Network configuration changed, trying to establish connection. Dec 13 03:47:43.593695 systemd-timesyncd[1502]: Network configuration changed, trying to establish connection. Dec 13 03:47:43.594440 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 03:47:43.604601 systemd[1]: Reached target network-online.target. Dec 13 03:47:43.613415 systemd[1]: Starting kubelet.service... Dec 13 03:47:44.249466 systemd[1]: Started kubelet.service. Dec 13 03:47:44.830895 kubelet[1617]: E1213 03:47:44.830827 1617 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:47:44.832125 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:47:44.832193 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:47:44.836418 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Dec 13 03:47:48.529039 login[1612]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 03:47:48.537330 login[1611]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 03:47:48.537982 systemd-logind[1591]: New session 1 of user core. Dec 13 03:47:48.538707 systemd[1]: Created slice user-500.slice. Dec 13 03:47:48.539519 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 03:47:48.541002 systemd-logind[1591]: New session 2 of user core. Dec 13 03:47:48.544827 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 03:47:48.545544 systemd[1]: Starting user@500.service... Dec 13 03:47:48.547522 (systemd)[1640]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:47:48.619359 systemd[1640]: Queued start job for default target default.target. Dec 13 03:47:48.619591 systemd[1640]: Reached target paths.target. Dec 13 03:47:48.619603 systemd[1640]: Reached target sockets.target. Dec 13 03:47:48.619611 systemd[1640]: Reached target timers.target. Dec 13 03:47:48.619618 systemd[1640]: Reached target basic.target. Dec 13 03:47:48.619638 systemd[1640]: Reached target default.target. Dec 13 03:47:48.619652 systemd[1640]: Startup finished in 69ms. Dec 13 03:47:48.619698 systemd[1]: Started user@500.service. Dec 13 03:47:48.620225 systemd[1]: Started session-1.scope. Dec 13 03:47:48.620581 systemd[1]: Started session-2.scope. Dec 13 03:47:48.970824 coreos-metadata[1518]: Dec 13 03:47:48.970 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 03:47:48.971613 coreos-metadata[1515]: Dec 13 03:47:48.970 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 03:47:49.970911 coreos-metadata[1515]: Dec 13 03:47:49.970 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 03:47:49.971222 coreos-metadata[1518]: Dec 13 03:47:49.970 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 03:47:50.328393 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Dec 13 03:47:50.328557 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Dec 13 03:47:51.026861 systemd[1]: Created slice system-sshd.slice. Dec 13 03:47:51.027571 systemd[1]: Started sshd@0-136.144.54.113:22-139.178.68.195:49724.service. Dec 13 03:47:51.081564 sshd[1661]: Accepted publickey for core from 139.178.68.195 port 49724 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:47:51.082695 sshd[1661]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:47:51.086840 systemd-logind[1591]: New session 3 of user core. Dec 13 03:47:51.087807 systemd[1]: Started session-3.scope. Dec 13 03:47:51.143637 systemd[1]: Started sshd@1-136.144.54.113:22-139.178.68.195:49732.service. Dec 13 03:47:51.179033 sshd[1666]: Accepted publickey for core from 139.178.68.195 port 49732 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:47:51.179719 sshd[1666]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:47:51.181916 systemd-logind[1591]: New session 4 of user core. Dec 13 03:47:51.182445 systemd[1]: Started session-4.scope. Dec 13 03:47:51.232969 sshd[1666]: pam_unix(sshd:session): session closed for user core Dec 13 03:47:51.235321 systemd[1]: sshd@1-136.144.54.113:22-139.178.68.195:49732.service: Deactivated successfully. Dec 13 03:47:51.235884 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 03:47:51.236422 systemd-logind[1591]: Session 4 logged out. Waiting for processes to exit. Dec 13 03:47:51.237375 systemd[1]: Started sshd@2-136.144.54.113:22-139.178.68.195:49738.service. Dec 13 03:47:51.238113 systemd-logind[1591]: Removed session 4. Dec 13 03:47:51.275484 sshd[1672]: Accepted publickey for core from 139.178.68.195 port 49738 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:47:51.276596 sshd[1672]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:47:51.280090 systemd-logind[1591]: New session 5 of user core. Dec 13 03:47:51.280945 systemd[1]: Started session-5.scope. Dec 13 03:47:51.347633 sshd[1672]: pam_unix(sshd:session): session closed for user core Dec 13 03:47:51.353497 systemd[1]: sshd@2-136.144.54.113:22-139.178.68.195:49738.service: Deactivated successfully. Dec 13 03:47:51.355183 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 03:47:51.356918 systemd-logind[1591]: Session 5 logged out. Waiting for processes to exit. Dec 13 03:47:51.359265 systemd-logind[1591]: Removed session 5. Dec 13 03:47:52.778768 coreos-metadata[1518]: Dec 13 03:47:52.778 INFO Fetch successful Dec 13 03:47:52.812359 systemd[1]: Finished coreos-metadata.service. Dec 13 03:47:52.813119 systemd[1]: Started packet-phone-home.service. Dec 13 03:47:52.818181 curl[1680]: % Total % Received % Xferd Average Speed Time Time Time Current Dec 13 03:47:52.818337 curl[1680]: Dload Upload Total Spent Left Speed Dec 13 03:47:52.871894 coreos-metadata[1515]: Dec 13 03:47:52.871 INFO Fetch successful Dec 13 03:47:52.911351 unknown[1515]: wrote ssh authorized keys file for user: core Dec 13 03:47:52.923318 update-ssh-keys[1681]: Updated "/home/core/.ssh/authorized_keys" Dec 13 03:47:52.923624 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 03:47:52.923796 systemd[1]: Reached target multi-user.target. Dec 13 03:47:52.924485 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 03:47:52.928672 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 03:47:52.928742 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 03:47:52.928878 systemd[1]: Startup finished in 1.860s (kernel) + 26.359s (initrd) + 16.727s (userspace) = 44.947s. Dec 13 03:47:53.131696 curl[1680]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Dec 13 03:47:53.134191 systemd[1]: packet-phone-home.service: Deactivated successfully. Dec 13 03:47:55.084218 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 03:47:55.084782 systemd[1]: Stopped kubelet.service. Dec 13 03:47:55.087882 systemd[1]: Starting kubelet.service... Dec 13 03:47:55.291069 systemd[1]: Started kubelet.service. Dec 13 03:47:55.324676 kubelet[1687]: E1213 03:47:55.324646 1687 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:47:55.326914 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:47:55.326990 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:48:01.356792 systemd[1]: Started sshd@3-136.144.54.113:22-139.178.68.195:46792.service. Dec 13 03:48:01.392897 sshd[1705]: Accepted publickey for core from 139.178.68.195 port 46792 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:01.393584 sshd[1705]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:01.395938 systemd-logind[1591]: New session 6 of user core. Dec 13 03:48:01.396393 systemd[1]: Started session-6.scope. Dec 13 03:48:01.447910 sshd[1705]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:01.449648 systemd[1]: sshd@3-136.144.54.113:22-139.178.68.195:46792.service: Deactivated successfully. Dec 13 03:48:01.449935 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 03:48:01.450252 systemd-logind[1591]: Session 6 logged out. Waiting for processes to exit. Dec 13 03:48:01.450805 systemd[1]: Started sshd@4-136.144.54.113:22-139.178.68.195:46806.service. Dec 13 03:48:01.451191 systemd-logind[1591]: Removed session 6. Dec 13 03:48:01.487346 sshd[1711]: Accepted publickey for core from 139.178.68.195 port 46806 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:01.488293 sshd[1711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:01.491457 systemd-logind[1591]: New session 7 of user core. Dec 13 03:48:01.492115 systemd[1]: Started session-7.scope. Dec 13 03:48:01.545797 sshd[1711]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:01.552930 systemd[1]: sshd@4-136.144.54.113:22-139.178.68.195:46806.service: Deactivated successfully. Dec 13 03:48:01.554498 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 03:48:01.556209 systemd-logind[1591]: Session 7 logged out. Waiting for processes to exit. Dec 13 03:48:01.558857 systemd[1]: Started sshd@5-136.144.54.113:22-139.178.68.195:46818.service. Dec 13 03:48:01.561364 systemd-logind[1591]: Removed session 7. Dec 13 03:48:01.620593 sshd[1717]: Accepted publickey for core from 139.178.68.195 port 46818 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:01.621239 sshd[1717]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:01.623743 systemd-logind[1591]: New session 8 of user core. Dec 13 03:48:01.624139 systemd[1]: Started session-8.scope. Dec 13 03:48:01.676203 sshd[1717]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:01.678962 systemd[1]: sshd@5-136.144.54.113:22-139.178.68.195:46818.service: Deactivated successfully. Dec 13 03:48:01.679612 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 03:48:01.680271 systemd-logind[1591]: Session 8 logged out. Waiting for processes to exit. Dec 13 03:48:01.681456 systemd[1]: Started sshd@6-136.144.54.113:22-139.178.68.195:46828.service. Dec 13 03:48:01.682381 systemd-logind[1591]: Removed session 8. Dec 13 03:48:01.751215 sshd[1723]: Accepted publickey for core from 139.178.68.195 port 46828 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:01.752485 sshd[1723]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:01.756679 systemd-logind[1591]: New session 9 of user core. Dec 13 03:48:01.757542 systemd[1]: Started session-9.scope. Dec 13 03:48:01.840020 sudo[1726]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 03:48:01.840722 sudo[1726]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:48:01.857794 dbus-daemon[1521]: Нs\u0018\x8aU: received setenforce notice (enforcing=1773112208) Dec 13 03:48:01.862045 sudo[1726]: pam_unix(sudo:session): session closed for user root Dec 13 03:48:01.863981 sshd[1723]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:01.865591 systemd[1]: sshd@6-136.144.54.113:22-139.178.68.195:46828.service: Deactivated successfully. Dec 13 03:48:01.865896 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 03:48:01.866202 systemd-logind[1591]: Session 9 logged out. Waiting for processes to exit. Dec 13 03:48:01.866804 systemd[1]: Started sshd@7-136.144.54.113:22-139.178.68.195:46840.service. Dec 13 03:48:01.867208 systemd-logind[1591]: Removed session 9. Dec 13 03:48:01.902797 sshd[1730]: Accepted publickey for core from 139.178.68.195 port 46840 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:01.903506 sshd[1730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:01.906098 systemd-logind[1591]: New session 10 of user core. Dec 13 03:48:01.906624 systemd[1]: Started session-10.scope. Dec 13 03:48:01.961512 sudo[1734]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 03:48:01.961633 sudo[1734]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:48:01.963509 sudo[1734]: pam_unix(sudo:session): session closed for user root Dec 13 03:48:01.965833 sudo[1733]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 03:48:01.965947 sudo[1733]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:48:01.971225 systemd[1]: Stopping audit-rules.service... Dec 13 03:48:01.971000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 03:48:01.972177 auditctl[1737]: No rules Dec 13 03:48:01.972353 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 03:48:01.972444 systemd[1]: Stopped audit-rules.service. Dec 13 03:48:01.973253 systemd[1]: Starting audit-rules.service... Dec 13 03:48:01.977535 kernel: kauditd_printk_skb: 132 callbacks suppressed Dec 13 03:48:01.977574 kernel: audit: type=1305 audit(1734061681.971:184): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 03:48:01.983314 augenrules[1754]: No rules Dec 13 03:48:01.983633 systemd[1]: Finished audit-rules.service. Dec 13 03:48:01.984143 sudo[1733]: pam_unix(sudo:session): session closed for user root Dec 13 03:48:01.984952 sshd[1730]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:01.986643 systemd[1]: sshd@7-136.144.54.113:22-139.178.68.195:46840.service: Deactivated successfully. Dec 13 03:48:01.986967 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 03:48:01.987261 systemd-logind[1591]: Session 10 logged out. Waiting for processes to exit. Dec 13 03:48:01.987848 systemd[1]: Started sshd@8-136.144.54.113:22-139.178.68.195:46848.service. Dec 13 03:48:01.988260 systemd-logind[1591]: Removed session 10. Dec 13 03:48:01.971000 audit[1737]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0bd9ac60 a2=420 a3=0 items=0 ppid=1 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:02.024063 kernel: audit: type=1300 audit(1734061681.971:184): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0bd9ac60 a2=420 a3=0 items=0 ppid=1 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:02.024094 kernel: audit: type=1327 audit(1734061681.971:184): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 03:48:01.971000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 03:48:02.033629 kernel: audit: type=1131 audit(1734061681.972:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:01.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:02.056026 kernel: audit: type=1130 audit(1734061681.983:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:01.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:02.063668 sshd[1760]: Accepted publickey for core from 139.178.68.195 port 46848 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:02.065082 sshd[1760]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:02.067347 systemd-logind[1591]: New session 11 of user core. Dec 13 03:48:02.067799 systemd[1]: Started session-11.scope. Dec 13 03:48:02.078473 kernel: audit: type=1106 audit(1734061681.983:187): pid=1733 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:48:01.983000 audit[1733]: USER_END pid=1733 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:48:02.104539 kernel: audit: type=1104 audit(1734061681.983:188): pid=1733 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:48:01.983000 audit[1733]: CRED_DISP pid=1733 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:48:02.114513 sudo[1763]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 03:48:02.114635 sudo[1763]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:48:02.128161 kernel: audit: type=1106 audit(1734061681.985:189): pid=1730 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:01.985000 audit[1730]: USER_END pid=1730 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:02.160476 kernel: audit: type=1104 audit(1734061681.985:190): pid=1730 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:01.985000 audit[1730]: CRED_DISP pid=1730 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:02.186555 kernel: audit: type=1131 audit(1734061681.986:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-136.144.54.113:22-139.178.68.195:46840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:01.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-136.144.54.113:22-139.178.68.195:46840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:01.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-136.144.54.113:22-139.178.68.195:46848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:02.063000 audit[1760]: USER_ACCT pid=1760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:02.064000 audit[1760]: CRED_ACQ pid=1760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:02.064000 audit[1760]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd51edbb30 a2=3 a3=0 items=0 ppid=1 pid=1760 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:02.064000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:02.069000 audit[1760]: USER_START pid=1760 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:02.070000 audit[1762]: CRED_ACQ pid=1762 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:02.114000 audit[1763]: USER_ACCT pid=1763 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:48:02.114000 audit[1763]: CRED_REFR pid=1763 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:48:02.115000 audit[1763]: USER_START pid=1763 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:48:02.911763 systemd[1]: Stopped kubelet.service. Dec 13 03:48:02.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:02.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:02.917221 systemd[1]: Starting kubelet.service... Dec 13 03:48:02.935136 systemd[1]: Reloading. Dec 13 03:48:02.967183 /usr/lib/systemd/system-generators/torcx-generator[1849]: time="2024-12-13T03:48:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:48:02.967198 /usr/lib/systemd/system-generators/torcx-generator[1849]: time="2024-12-13T03:48:02Z" level=info msg="torcx already run" Dec 13 03:48:03.019122 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:48:03.019130 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:48:03.030945 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit: BPF prog-id=40 op=LOAD Dec 13 03:48:03.076000 audit: BPF prog-id=35 op=UNLOAD Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.077000 audit: BPF prog-id=41 op=LOAD Dec 13 03:48:03.077000 audit: BPF prog-id=33 op=UNLOAD Dec 13 03:48:03.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit: BPF prog-id=42 op=LOAD Dec 13 03:48:03.078000 audit: BPF prog-id=24 op=UNLOAD Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit: BPF prog-id=43 op=LOAD Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.078000 audit: BPF prog-id=44 op=LOAD Dec 13 03:48:03.078000 audit: BPF prog-id=25 op=UNLOAD Dec 13 03:48:03.078000 audit: BPF prog-id=26 op=UNLOAD Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit: BPF prog-id=45 op=LOAD Dec 13 03:48:03.079000 audit: BPF prog-id=27 op=UNLOAD Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit: BPF prog-id=46 op=LOAD Dec 13 03:48:03.080000 audit: BPF prog-id=28 op=UNLOAD Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit: BPF prog-id=47 op=LOAD Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit: BPF prog-id=48 op=LOAD Dec 13 03:48:03.080000 audit: BPF prog-id=29 op=UNLOAD Dec 13 03:48:03.080000 audit: BPF prog-id=30 op=UNLOAD Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit: BPF prog-id=49 op=LOAD Dec 13 03:48:03.081000 audit: BPF prog-id=36 op=UNLOAD Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit: BPF prog-id=50 op=LOAD Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit: BPF prog-id=51 op=LOAD Dec 13 03:48:03.081000 audit: BPF prog-id=37 op=UNLOAD Dec 13 03:48:03.081000 audit: BPF prog-id=38 op=UNLOAD Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit: BPF prog-id=52 op=LOAD Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.081000 audit: BPF prog-id=53 op=LOAD Dec 13 03:48:03.081000 audit: BPF prog-id=31 op=UNLOAD Dec 13 03:48:03.081000 audit: BPF prog-id=32 op=UNLOAD Dec 13 03:48:03.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.082000 audit: BPF prog-id=54 op=LOAD Dec 13 03:48:03.082000 audit: BPF prog-id=34 op=UNLOAD Dec 13 03:48:03.095573 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 03:48:03.095610 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 03:48:03.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 03:48:03.095721 systemd[1]: Stopped kubelet.service. Dec 13 03:48:03.096544 systemd[1]: Starting kubelet.service... Dec 13 03:48:03.278859 systemd[1]: Started kubelet.service. Dec 13 03:48:03.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:03.322415 kubelet[1913]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:48:03.322415 kubelet[1913]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 03:48:03.322415 kubelet[1913]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:48:03.322651 kubelet[1913]: I1213 03:48:03.322428 1913 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 03:48:03.558952 kubelet[1913]: I1213 03:48:03.558903 1913 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 03:48:03.558952 kubelet[1913]: I1213 03:48:03.558917 1913 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 03:48:03.559057 kubelet[1913]: I1213 03:48:03.559035 1913 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 03:48:03.582547 kubelet[1913]: I1213 03:48:03.582512 1913 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 03:48:03.609334 kubelet[1913]: I1213 03:48:03.609290 1913 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 03:48:03.610082 kubelet[1913]: I1213 03:48:03.610038 1913 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 03:48:03.610180 kubelet[1913]: I1213 03:48:03.610148 1913 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 03:48:03.610568 kubelet[1913]: I1213 03:48:03.610531 1913 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 03:48:03.610568 kubelet[1913]: I1213 03:48:03.610541 1913 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 03:48:03.610640 kubelet[1913]: I1213 03:48:03.610598 1913 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:48:03.610669 kubelet[1913]: I1213 03:48:03.610650 1913 kubelet.go:396] "Attempting to sync node with API server" Dec 13 03:48:03.610669 kubelet[1913]: I1213 03:48:03.610659 1913 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 03:48:03.610730 kubelet[1913]: I1213 03:48:03.610681 1913 kubelet.go:312] "Adding apiserver pod source" Dec 13 03:48:03.610730 kubelet[1913]: I1213 03:48:03.610695 1913 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 03:48:03.610730 kubelet[1913]: E1213 03:48:03.610717 1913 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:03.610821 kubelet[1913]: E1213 03:48:03.610749 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:03.612007 kubelet[1913]: I1213 03:48:03.611967 1913 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 03:48:03.615048 kubelet[1913]: I1213 03:48:03.615008 1913 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 03:48:03.618909 kubelet[1913]: W1213 03:48:03.618872 1913 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 03:48:03.619280 kubelet[1913]: I1213 03:48:03.619241 1913 server.go:1256] "Started kubelet" Dec 13 03:48:03.619353 kubelet[1913]: I1213 03:48:03.619291 1913 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 03:48:03.619475 kubelet[1913]: I1213 03:48:03.619459 1913 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 03:48:03.619660 kubelet[1913]: I1213 03:48:03.619647 1913 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 03:48:03.619000 audit[1913]: AVC avc: denied { mac_admin } for pid=1913 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.619000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:48:03.619000 audit[1913]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000244cc0 a1=c000aa6660 a2=c000244c90 a3=25 items=0 ppid=1 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:48:03.619000 audit[1913]: AVC avc: denied { mac_admin } for pid=1913 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.619000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:48:03.619000 audit[1913]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0012a8ea0 a1=c000aa6678 a2=c000244d50 a3=25 items=0 ppid=1 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:48:03.620348 kubelet[1913]: I1213 03:48:03.619959 1913 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 03:48:03.620348 kubelet[1913]: I1213 03:48:03.619992 1913 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 03:48:03.620348 kubelet[1913]: I1213 03:48:03.620039 1913 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 03:48:03.620348 kubelet[1913]: I1213 03:48:03.620099 1913 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 03:48:03.620348 kubelet[1913]: I1213 03:48:03.620125 1913 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 03:48:03.620348 kubelet[1913]: E1213 03:48:03.620183 1913 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.80.37\" not found" Dec 13 03:48:03.620348 kubelet[1913]: I1213 03:48:03.620192 1913 server.go:461] "Adding debug handlers to kubelet server" Dec 13 03:48:03.620348 kubelet[1913]: I1213 03:48:03.620198 1913 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 03:48:03.622759 kubelet[1913]: E1213 03:48:03.622748 1913 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.80.37\" not found" node="10.67.80.37" Dec 13 03:48:03.624288 kubelet[1913]: I1213 03:48:03.624275 1913 factory.go:221] Registration of the systemd container factory successfully Dec 13 03:48:03.624373 kubelet[1913]: I1213 03:48:03.624352 1913 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 03:48:03.626053 kubelet[1913]: I1213 03:48:03.626031 1913 factory.go:221] Registration of the containerd container factory successfully Dec 13 03:48:03.626053 kubelet[1913]: E1213 03:48:03.626037 1913 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 03:48:03.634610 kubelet[1913]: I1213 03:48:03.634557 1913 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 03:48:03.634610 kubelet[1913]: I1213 03:48:03.634585 1913 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 03:48:03.634610 kubelet[1913]: I1213 03:48:03.634610 1913 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:48:03.635453 kubelet[1913]: I1213 03:48:03.635445 1913 policy_none.go:49] "None policy: Start" Dec 13 03:48:03.635768 kubelet[1913]: I1213 03:48:03.635759 1913 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 03:48:03.635812 kubelet[1913]: I1213 03:48:03.635772 1913 state_mem.go:35] "Initializing new in-memory state store" Dec 13 03:48:03.638199 systemd[1]: Created slice kubepods.slice. Dec 13 03:48:03.640526 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 03:48:03.641981 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 03:48:03.646000 audit[1938]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:03.646000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdcd0e94c0 a2=0 a3=7ffdcd0e94ac items=0 ppid=1913 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 03:48:03.647000 audit[1941]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:03.647000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe01879d50 a2=0 a3=7ffe01879d3c items=0 ppid=1913 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 03:48:03.653000 audit[1913]: AVC avc: denied { mac_admin } for pid=1913 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:03.653000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:48:03.653000 audit[1913]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008c1a10 a1=c00110d590 a2=c0008c19e0 a3=25 items=0 ppid=1 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.653000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:48:03.654237 kubelet[1913]: I1213 03:48:03.654034 1913 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 03:48:03.654237 kubelet[1913]: I1213 03:48:03.654062 1913 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 03:48:03.654237 kubelet[1913]: I1213 03:48:03.654195 1913 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 03:48:03.654852 kubelet[1913]: E1213 03:48:03.654827 1913 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.80.37\" not found" Dec 13 03:48:03.648000 audit[1943]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:03.648000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd81d86ed0 a2=0 a3=7ffd81d86ebc items=0 ppid=1913 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:48:03.678000 audit[1948]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:03.678000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffee3e68a70 a2=0 a3=7ffee3e68a5c items=0 ppid=1913 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:48:03.721296 kubelet[1913]: I1213 03:48:03.721246 1913 kubelet_node_status.go:73] "Attempting to register node" node="10.67.80.37" Dec 13 03:48:03.729156 kubelet[1913]: I1213 03:48:03.729111 1913 kubelet_node_status.go:76] "Successfully registered node" node="10.67.80.37" Dec 13 03:48:03.735000 audit[1953]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:03.735000 audit[1953]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc868a8f60 a2=0 a3=7ffc868a8f4c items=0 ppid=1913 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 03:48:03.735943 kubelet[1913]: I1213 03:48:03.735862 1913 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 03:48:03.736000 audit[1954]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:03.736000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffda5934dd0 a2=0 a3=7ffda5934dbc items=0 ppid=1913 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.736000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 03:48:03.736000 audit[1955]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:03.736000 audit[1955]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffddfd15d40 a2=0 a3=7ffddfd15d2c items=0 ppid=1913 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 03:48:03.737113 kubelet[1913]: I1213 03:48:03.736894 1913 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 03:48:03.737113 kubelet[1913]: I1213 03:48:03.736920 1913 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 03:48:03.737113 kubelet[1913]: I1213 03:48:03.736943 1913 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 03:48:03.737113 kubelet[1913]: E1213 03:48:03.737032 1913 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 03:48:03.737566 kubelet[1913]: I1213 03:48:03.737548 1913 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 03:48:03.737000 audit[1957]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:03.737000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc38502490 a2=0 a3=7ffc3850247c items=0 ppid=1913 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 03:48:03.737000 audit[1956]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:03.737000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd4f986f0 a2=0 a3=10e3 items=0 ppid=1913 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 03:48:03.738177 env[1556]: time="2024-12-13T03:48:03.737785034Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 03:48:03.738462 kubelet[1913]: I1213 03:48:03.737938 1913 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 03:48:03.738000 audit[1958]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:03.738000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6614a7c0 a2=0 a3=7ffc6614a7ac items=0 ppid=1913 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 03:48:03.738000 audit[1959]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:03.738000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffbfd2f160 a2=0 a3=10e3 items=0 ppid=1913 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 03:48:03.739000 audit[1960]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:03.739000 audit[1960]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe651333e0 a2=0 a3=7ffe651333cc items=0 ppid=1913 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:03.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 03:48:04.560595 kubelet[1913]: I1213 03:48:04.560521 1913 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 03:48:04.561607 kubelet[1913]: W1213 03:48:04.560937 1913 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 03:48:04.561607 kubelet[1913]: W1213 03:48:04.560951 1913 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 03:48:04.561607 kubelet[1913]: W1213 03:48:04.561049 1913 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 03:48:04.611549 kubelet[1913]: E1213 03:48:04.611468 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:04.611549 kubelet[1913]: I1213 03:48:04.611467 1913 apiserver.go:52] "Watching apiserver" Dec 13 03:48:04.618226 kubelet[1913]: I1213 03:48:04.618170 1913 topology_manager.go:215] "Topology Admit Handler" podUID="6efec938-ea07-4f7c-a82c-aebcb7c3e1fa" podNamespace="calico-system" podName="calico-node-pzpfd" Dec 13 03:48:04.618519 kubelet[1913]: I1213 03:48:04.618489 1913 topology_manager.go:215] "Topology Admit Handler" podUID="794697ba-55b5-4875-b715-3d8e07467cfc" podNamespace="calico-system" podName="csi-node-driver-jtb5l" Dec 13 03:48:04.618771 kubelet[1913]: I1213 03:48:04.618734 1913 topology_manager.go:215] "Topology Admit Handler" podUID="5f167f5a-a2d3-4a70-a366-1186c1218b17" podNamespace="kube-system" podName="kube-proxy-wd5wz" Dec 13 03:48:04.619215 kubelet[1913]: E1213 03:48:04.619159 1913 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jtb5l" podUID="794697ba-55b5-4875-b715-3d8e07467cfc" Dec 13 03:48:04.621275 kubelet[1913]: I1213 03:48:04.621219 1913 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 03:48:04.625933 kubelet[1913]: I1213 03:48:04.625848 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-var-run-calico\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.626151 kubelet[1913]: I1213 03:48:04.626049 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-var-lib-calico\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.626748 kubelet[1913]: I1213 03:48:04.626695 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dq68s\" (UniqueName: \"kubernetes.io/projected/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-kube-api-access-dq68s\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.627035 kubelet[1913]: I1213 03:48:04.626846 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4p5p7\" (UniqueName: \"kubernetes.io/projected/5f167f5a-a2d3-4a70-a366-1186c1218b17-kube-api-access-4p5p7\") pod \"kube-proxy-wd5wz\" (UID: \"5f167f5a-a2d3-4a70-a366-1186c1218b17\") " pod="kube-system/kube-proxy-wd5wz" Dec 13 03:48:04.627590 kubelet[1913]: I1213 03:48:04.627513 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-cni-bin-dir\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.627798 kubelet[1913]: I1213 03:48:04.627729 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-cni-net-dir\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.627968 kubelet[1913]: I1213 03:48:04.627896 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-cni-log-dir\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.628160 kubelet[1913]: I1213 03:48:04.628049 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/794697ba-55b5-4875-b715-3d8e07467cfc-varrun\") pod \"csi-node-driver-jtb5l\" (UID: \"794697ba-55b5-4875-b715-3d8e07467cfc\") " pod="calico-system/csi-node-driver-jtb5l" Dec 13 03:48:04.628368 kubelet[1913]: I1213 03:48:04.628195 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-lib-modules\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.628791 kubelet[1913]: I1213 03:48:04.628742 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-xtables-lock\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.628996 kubelet[1913]: I1213 03:48:04.628878 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-policysync\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.629172 kubelet[1913]: I1213 03:48:04.629023 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-tigera-ca-bundle\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.629172 kubelet[1913]: I1213 03:48:04.629160 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5f167f5a-a2d3-4a70-a366-1186c1218b17-xtables-lock\") pod \"kube-proxy-wd5wz\" (UID: \"5f167f5a-a2d3-4a70-a366-1186c1218b17\") " pod="kube-system/kube-proxy-wd5wz" Dec 13 03:48:04.629552 kubelet[1913]: I1213 03:48:04.629313 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-flexvol-driver-host\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.629552 kubelet[1913]: I1213 03:48:04.629487 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ncxht\" (UniqueName: \"kubernetes.io/projected/794697ba-55b5-4875-b715-3d8e07467cfc-kube-api-access-ncxht\") pod \"csi-node-driver-jtb5l\" (UID: \"794697ba-55b5-4875-b715-3d8e07467cfc\") " pod="calico-system/csi-node-driver-jtb5l" Dec 13 03:48:04.630212 kubelet[1913]: I1213 03:48:04.630197 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/5f167f5a-a2d3-4a70-a366-1186c1218b17-kube-proxy\") pod \"kube-proxy-wd5wz\" (UID: \"5f167f5a-a2d3-4a70-a366-1186c1218b17\") " pod="kube-system/kube-proxy-wd5wz" Dec 13 03:48:04.630267 kubelet[1913]: I1213 03:48:04.630245 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5f167f5a-a2d3-4a70-a366-1186c1218b17-lib-modules\") pod \"kube-proxy-wd5wz\" (UID: \"5f167f5a-a2d3-4a70-a366-1186c1218b17\") " pod="kube-system/kube-proxy-wd5wz" Dec 13 03:48:04.630292 kubelet[1913]: I1213 03:48:04.630281 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6efec938-ea07-4f7c-a82c-aebcb7c3e1fa-node-certs\") pod \"calico-node-pzpfd\" (UID: \"6efec938-ea07-4f7c-a82c-aebcb7c3e1fa\") " pod="calico-system/calico-node-pzpfd" Dec 13 03:48:04.630350 kubelet[1913]: I1213 03:48:04.630319 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/794697ba-55b5-4875-b715-3d8e07467cfc-kubelet-dir\") pod \"csi-node-driver-jtb5l\" (UID: \"794697ba-55b5-4875-b715-3d8e07467cfc\") " pod="calico-system/csi-node-driver-jtb5l" Dec 13 03:48:04.630350 kubelet[1913]: I1213 03:48:04.630336 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/794697ba-55b5-4875-b715-3d8e07467cfc-socket-dir\") pod \"csi-node-driver-jtb5l\" (UID: \"794697ba-55b5-4875-b715-3d8e07467cfc\") " pod="calico-system/csi-node-driver-jtb5l" Dec 13 03:48:04.630393 kubelet[1913]: I1213 03:48:04.630376 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/794697ba-55b5-4875-b715-3d8e07467cfc-registration-dir\") pod \"csi-node-driver-jtb5l\" (UID: \"794697ba-55b5-4875-b715-3d8e07467cfc\") " pod="calico-system/csi-node-driver-jtb5l" Dec 13 03:48:04.630822 systemd[1]: Created slice kubepods-besteffort-pod6efec938_ea07_4f7c_a82c_aebcb7c3e1fa.slice. Dec 13 03:48:04.644736 systemd[1]: Created slice kubepods-besteffort-pod5f167f5a_a2d3_4a70_a366_1186c1218b17.slice. Dec 13 03:48:04.734172 kubelet[1913]: E1213 03:48:04.734115 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:04.734172 kubelet[1913]: W1213 03:48:04.734160 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:04.734561 kubelet[1913]: E1213 03:48:04.734231 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:04.734867 kubelet[1913]: E1213 03:48:04.734826 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:04.734867 kubelet[1913]: W1213 03:48:04.734864 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:04.735107 kubelet[1913]: E1213 03:48:04.734906 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:04.738822 kubelet[1913]: E1213 03:48:04.738815 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:04.738822 kubelet[1913]: W1213 03:48:04.738822 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:04.738878 kubelet[1913]: E1213 03:48:04.738832 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:04.745383 kubelet[1913]: E1213 03:48:04.745360 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:04.745383 kubelet[1913]: W1213 03:48:04.745367 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:04.745383 kubelet[1913]: E1213 03:48:04.745379 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:04.745578 kubelet[1913]: E1213 03:48:04.745540 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:04.745578 kubelet[1913]: W1213 03:48:04.745547 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:04.745578 kubelet[1913]: E1213 03:48:04.745557 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:04.745749 kubelet[1913]: E1213 03:48:04.745711 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:04.745749 kubelet[1913]: W1213 03:48:04.745718 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:04.745749 kubelet[1913]: E1213 03:48:04.745726 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:04.806504 sudo[1763]: pam_unix(sudo:session): session closed for user root Dec 13 03:48:04.806000 audit[1763]: USER_END pid=1763 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:48:04.806000 audit[1763]: CRED_DISP pid=1763 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:48:04.809495 sshd[1760]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:04.811000 audit[1760]: USER_END pid=1760 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:04.812000 audit[1760]: CRED_DISP pid=1760 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:04.815565 systemd[1]: sshd@8-136.144.54.113:22-139.178.68.195:46848.service: Deactivated successfully. Dec 13 03:48:04.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-136.144.54.113:22-139.178.68.195:46848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:04.817517 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 03:48:04.818580 systemd-logind[1591]: Session 11 logged out. Waiting for processes to exit. Dec 13 03:48:04.819138 systemd-logind[1591]: Removed session 11. Dec 13 03:48:04.946917 env[1556]: time="2024-12-13T03:48:04.946785049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pzpfd,Uid:6efec938-ea07-4f7c-a82c-aebcb7c3e1fa,Namespace:calico-system,Attempt:0,}" Dec 13 03:48:04.946917 env[1556]: time="2024-12-13T03:48:04.946804749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wd5wz,Uid:5f167f5a-a2d3-4a70-a366-1186c1218b17,Namespace:kube-system,Attempt:0,}" Dec 13 03:48:05.594387 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3005197495.mount: Deactivated successfully. Dec 13 03:48:05.595949 env[1556]: time="2024-12-13T03:48:05.595930003Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:05.596515 env[1556]: time="2024-12-13T03:48:05.596501740Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:05.596900 env[1556]: time="2024-12-13T03:48:05.596861205Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:05.597272 env[1556]: time="2024-12-13T03:48:05.597258299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:05.598514 env[1556]: time="2024-12-13T03:48:05.598500281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:05.599746 env[1556]: time="2024-12-13T03:48:05.599705363Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:05.600126 env[1556]: time="2024-12-13T03:48:05.600085594Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:05.600511 env[1556]: time="2024-12-13T03:48:05.600471581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:05.608228 env[1556]: time="2024-12-13T03:48:05.608194648Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:48:05.608228 env[1556]: time="2024-12-13T03:48:05.608217712Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:48:05.608228 env[1556]: time="2024-12-13T03:48:05.608224658Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:48:05.608391 env[1556]: time="2024-12-13T03:48:05.608286435Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/280e59d73fae3c434ff4f3410d9003c81fd76d37b70ee49b733fb45524249c0f pid=1989 runtime=io.containerd.runc.v2 Dec 13 03:48:05.608737 env[1556]: time="2024-12-13T03:48:05.608713198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:48:05.608737 env[1556]: time="2024-12-13T03:48:05.608731812Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:48:05.608791 env[1556]: time="2024-12-13T03:48:05.608738937Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:48:05.608889 env[1556]: time="2024-12-13T03:48:05.608875269Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ea6a2753a24ae66bfb9ac767a93319ec48df466110d6a6300f8379bc107339c pid=1997 runtime=io.containerd.runc.v2 Dec 13 03:48:05.612038 kubelet[1913]: E1213 03:48:05.612020 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:05.614725 systemd[1]: Started cri-containerd-280e59d73fae3c434ff4f3410d9003c81fd76d37b70ee49b733fb45524249c0f.scope. Dec 13 03:48:05.615419 systemd[1]: Started cri-containerd-8ea6a2753a24ae66bfb9ac767a93319ec48df466110d6a6300f8379bc107339c.scope. Dec 13 03:48:05.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit: BPF prog-id=55 op=LOAD Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1989 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238306535396437336661653363343334666634663334313064393030 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1989 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238306535396437336661653363343334666634663334313064393030 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit: BPF prog-id=56 op=LOAD Dec 13 03:48:05.620000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003aab90 items=0 ppid=1989 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238306535396437336661653363343334666634663334313064393030 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit: BPF prog-id=57 op=LOAD Dec 13 03:48:05.620000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003aabd8 items=0 ppid=1989 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238306535396437336661653363343334666634663334313064393030 Dec 13 03:48:05.620000 audit: BPF prog-id=57 op=UNLOAD Dec 13 03:48:05.620000 audit: BPF prog-id=56 op=UNLOAD Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.620000 audit: BPF prog-id=58 op=LOAD Dec 13 03:48:05.620000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003aafe8 items=0 ppid=1989 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238306535396437336661653363343334666634663334313064393030 Dec 13 03:48:05.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit: BPF prog-id=59 op=LOAD Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=1997 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865613661323735336132346165363662666239616337363761393333 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=1997 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865613661323735336132346165363662666239616337363761393333 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit: BPF prog-id=60 op=LOAD Dec 13 03:48:05.621000 audit[2011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c000261d90 items=0 ppid=1997 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865613661323735336132346165363662666239616337363761393333 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit: BPF prog-id=61 op=LOAD Dec 13 03:48:05.621000 audit[2011]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c000261dd8 items=0 ppid=1997 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865613661323735336132346165363662666239616337363761393333 Dec 13 03:48:05.621000 audit: BPF prog-id=61 op=UNLOAD Dec 13 03:48:05.621000 audit: BPF prog-id=60 op=UNLOAD Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:05.621000 audit: BPF prog-id=62 op=LOAD Dec 13 03:48:05.621000 audit[2011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c0003be1e8 items=0 ppid=1997 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865613661323735336132346165363662666239616337363761393333 Dec 13 03:48:05.625760 env[1556]: time="2024-12-13T03:48:05.625734615Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wd5wz,Uid:5f167f5a-a2d3-4a70-a366-1186c1218b17,Namespace:kube-system,Attempt:0,} returns sandbox id \"280e59d73fae3c434ff4f3410d9003c81fd76d37b70ee49b733fb45524249c0f\"" Dec 13 03:48:05.626448 env[1556]: time="2024-12-13T03:48:05.626430364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pzpfd,Uid:6efec938-ea07-4f7c-a82c-aebcb7c3e1fa,Namespace:calico-system,Attempt:0,} returns sandbox id \"8ea6a2753a24ae66bfb9ac767a93319ec48df466110d6a6300f8379bc107339c\"" Dec 13 03:48:05.627160 env[1556]: time="2024-12-13T03:48:05.627141317Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 03:48:06.586333 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2131704991.mount: Deactivated successfully. Dec 13 03:48:06.612582 kubelet[1913]: E1213 03:48:06.612540 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:06.737509 kubelet[1913]: E1213 03:48:06.737456 1913 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jtb5l" podUID="794697ba-55b5-4875-b715-3d8e07467cfc" Dec 13 03:48:06.937606 env[1556]: time="2024-12-13T03:48:06.937542173Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:06.938186 env[1556]: time="2024-12-13T03:48:06.938172149Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:06.938685 env[1556]: time="2024-12-13T03:48:06.938672361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:06.939530 env[1556]: time="2024-12-13T03:48:06.939501883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:06.939739 env[1556]: time="2024-12-13T03:48:06.939728439Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 03:48:06.940244 env[1556]: time="2024-12-13T03:48:06.940233471Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 03:48:06.941040 env[1556]: time="2024-12-13T03:48:06.941026577Z" level=info msg="CreateContainer within sandbox \"280e59d73fae3c434ff4f3410d9003c81fd76d37b70ee49b733fb45524249c0f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 03:48:06.946418 env[1556]: time="2024-12-13T03:48:06.946374950Z" level=info msg="CreateContainer within sandbox \"280e59d73fae3c434ff4f3410d9003c81fd76d37b70ee49b733fb45524249c0f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"65316226e55797e3c835f01d0d08c5716b5e8b4fdeab207904843012d2628330\"" Dec 13 03:48:06.946751 env[1556]: time="2024-12-13T03:48:06.946739912Z" level=info msg="StartContainer for \"65316226e55797e3c835f01d0d08c5716b5e8b4fdeab207904843012d2628330\"" Dec 13 03:48:06.957806 systemd[1]: Started cri-containerd-65316226e55797e3c835f01d0d08c5716b5e8b4fdeab207904843012d2628330.scope. Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7fe3d4f1b7c8 items=0 ppid=1989 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:06.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333136323236653535373937653363383335663031643064303863 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit: BPF prog-id=63 op=LOAD Dec 13 03:48:06.964000 audit[2065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0003c2428 items=0 ppid=1989 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:06.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333136323236653535373937653363383335663031643064303863 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit: BPF prog-id=64 op=LOAD Dec 13 03:48:06.964000 audit[2065]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0003c2478 items=0 ppid=1989 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:06.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333136323236653535373937653363383335663031643064303863 Dec 13 03:48:06.964000 audit: BPF prog-id=64 op=UNLOAD Dec 13 03:48:06.964000 audit: BPF prog-id=63 op=UNLOAD Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:06.964000 audit: BPF prog-id=65 op=LOAD Dec 13 03:48:06.964000 audit[2065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0003c2508 items=0 ppid=1989 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:06.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333136323236653535373937653363383335663031643064303863 Dec 13 03:48:06.970174 env[1556]: time="2024-12-13T03:48:06.970153195Z" level=info msg="StartContainer for \"65316226e55797e3c835f01d0d08c5716b5e8b4fdeab207904843012d2628330\" returns successfully" Dec 13 03:48:07.002000 audit[2128]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.008469 kernel: kauditd_printk_skb: 397 callbacks suppressed Dec 13 03:48:07.008547 kernel: audit: type=1325 audit(1734061687.002:439): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.002000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe335b07c0 a2=0 a3=7ffe335b07ac items=0 ppid=2075 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.090566 kernel: audit: type=1300 audit(1734061687.002:439): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe335b07c0 a2=0 a3=7ffe335b07ac items=0 ppid=2075 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.090592 kernel: audit: type=1327 audit(1734061687.002:439): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:48:07.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:48:07.140596 kernel: audit: type=1325 audit(1734061687.002:440): table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.002000 audit[2129]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.191579 kernel: audit: type=1300 audit(1734061687.002:440): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3c759420 a2=0 a3=7ffc3c75940c items=0 ppid=2075 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.002000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3c759420 a2=0 a3=7ffc3c75940c items=0 ppid=2075 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.279480 kernel: audit: type=1327 audit(1734061687.002:440): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:48:07.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:48:07.334426 kernel: audit: type=1325 audit(1734061687.003:441): table=nat:16 family=2 entries=1 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.003000 audit[2130]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.390055 kernel: audit: type=1300 audit(1734061687.003:441): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcd137ac0 a2=0 a3=7fffcd137aac items=0 ppid=2075 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.003000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcd137ac0 a2=0 a3=7fffcd137aac items=0 ppid=2075 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.485264 kernel: audit: type=1327 audit(1734061687.003:441): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:48:07.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:48:07.543041 kernel: audit: type=1325 audit(1734061687.003:442): table=nat:17 family=10 entries=1 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.003000 audit[2131]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.003000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8a5322a0 a2=0 a3=7fff8a53228c items=0 ppid=2075 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:48:07.003000 audit[2132]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.003000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7ba93d90 a2=0 a3=7ffd7ba93d7c items=0 ppid=2075 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 03:48:07.003000 audit[2133]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.003000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff193e8e90 a2=0 a3=7fff193e8e7c items=0 ppid=2075 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 03:48:07.103000 audit[2135]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.103000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff3ca84670 a2=0 a3=7fff3ca8465c items=0 ppid=2075 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 03:48:07.104000 audit[2137]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.104000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffef112d350 a2=0 a3=7ffef112d33c items=0 ppid=2075 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 03:48:07.106000 audit[2140]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.106000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff5e4c96b0 a2=0 a3=7fff5e4c969c items=0 ppid=2075 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 03:48:07.106000 audit[2141]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.106000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc956e540 a2=0 a3=7ffdc956e52c items=0 ppid=2075 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 03:48:07.108000 audit[2143]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.108000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffecce54110 a2=0 a3=7ffecce540fc items=0 ppid=2075 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 03:48:07.108000 audit[2144]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.108000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6c5a5760 a2=0 a3=7ffe6c5a574c items=0 ppid=2075 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 03:48:07.109000 audit[2146]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.109000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde35788d0 a2=0 a3=7ffde35788bc items=0 ppid=2075 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 03:48:07.111000 audit[2149]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.111000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe21276440 a2=0 a3=7ffe2127642c items=0 ppid=2075 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 03:48:07.112000 audit[2150]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.112000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0936e9a0 a2=0 a3=7ffe0936e98c items=0 ppid=2075 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 03:48:07.113000 audit[2152]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.113000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffedbb9e710 a2=0 a3=7ffedbb9e6fc items=0 ppid=2075 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 03:48:07.114000 audit[2153]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.114000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeecff8680 a2=0 a3=7ffeecff866c items=0 ppid=2075 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 03:48:07.115000 audit[2155]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.115000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcdff196b0 a2=0 a3=7ffcdff1969c items=0 ppid=2075 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:48:07.603000 audit[2158]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.603000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd96379e0 a2=0 a3=7fffd96379cc items=0 ppid=2075 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:48:07.604000 audit[2161]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.604000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff745c3230 a2=0 a3=7fff745c321c items=0 ppid=2075 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 03:48:07.605000 audit[2162]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.605000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffa5054450 a2=0 a3=7fffa505443c items=0 ppid=2075 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 03:48:07.612632 kubelet[1913]: E1213 03:48:07.612585 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:07.606000 audit[2164]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.606000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffce7633670 a2=0 a3=7ffce763365c items=0 ppid=2075 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.606000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:48:07.637000 audit[2170]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.637000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd468cbb20 a2=0 a3=7ffd468cbb0c items=0 ppid=2075 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.637000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:48:07.638000 audit[2171]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.638000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc35d39a50 a2=0 a3=7ffc35d39a3c items=0 ppid=2075 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 03:48:07.639000 audit[2173]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:48:07.639000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffd54d7590 a2=0 a3=7fffd54d757c items=0 ppid=2075 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.639000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 03:48:07.646000 audit[2179]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:07.646000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe090434b0 a2=0 a3=7ffe0904349c items=0 ppid=2075 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:07.690000 audit[2179]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:07.690000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffe090434b0 a2=0 a3=7ffe0904349c items=0 ppid=2075 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:07.706000 audit[2187]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.706000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdc6060df0 a2=0 a3=7ffdc6060ddc items=0 ppid=2075 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.706000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 03:48:07.709000 audit[2189]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.709000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff27558d50 a2=0 a3=7fff27558d3c items=0 ppid=2075 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.709000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 03:48:07.713000 audit[2192]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.713000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe6b755fd0 a2=0 a3=7ffe6b755fbc items=0 ppid=2075 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 03:48:07.714000 audit[2193]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.714000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda7656640 a2=0 a3=7ffda765662c items=0 ppid=2075 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 03:48:07.716000 audit[2195]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.716000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffb96f2360 a2=0 a3=7fffb96f234c items=0 ppid=2075 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 03:48:07.717000 audit[2196]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.717000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3881b610 a2=0 a3=7fff3881b5fc items=0 ppid=2075 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.717000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 03:48:07.720000 audit[2198]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.720000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff02616e30 a2=0 a3=7fff02616e1c items=0 ppid=2075 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.720000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 03:48:07.724000 audit[2201]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.724000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc74a182a0 a2=0 a3=7ffc74a1828c items=0 ppid=2075 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 03:48:07.725000 audit[2202]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.725000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff16d1d360 a2=0 a3=7fff16d1d34c items=0 ppid=2075 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 03:48:07.727000 audit[2204]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.727000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6c11c9b0 a2=0 a3=7fff6c11c99c items=0 ppid=2075 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 03:48:07.728000 audit[2205]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.728000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf4dc7a30 a2=0 a3=7ffcf4dc7a1c items=0 ppid=2075 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 03:48:07.731000 audit[2207]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.731000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc46bfb970 a2=0 a3=7ffc46bfb95c items=0 ppid=2075 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:48:07.735000 audit[2210]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.735000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff8f274550 a2=0 a3=7fff8f27453c items=0 ppid=2075 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 03:48:07.738000 audit[2213]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.738000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5a2e56e0 a2=0 a3=7ffc5a2e56cc items=0 ppid=2075 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 03:48:07.739000 audit[2214]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.739000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd8399f8a0 a2=0 a3=7ffd8399f88c items=0 ppid=2075 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 03:48:07.742000 audit[2216]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.742000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd42ddf200 a2=0 a3=7ffd42ddf1ec items=0 ppid=2075 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:48:07.745000 audit[2219]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.745000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcb0f13a60 a2=0 a3=7ffcb0f13a4c items=0 ppid=2075 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:48:07.746000 audit[2220]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.746000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcd2977b0 a2=0 a3=7ffdcd29779c items=0 ppid=2075 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 03:48:07.749000 audit[2222]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.749000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe5d8dcd70 a2=0 a3=7ffe5d8dcd5c items=0 ppid=2075 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.749000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 03:48:07.750000 audit[2223]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.750000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefe386870 a2=0 a3=7ffefe38685c items=0 ppid=2075 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 03:48:07.752000 audit[2225]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.752000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd3736590 a2=0 a3=7fffd373657c items=0 ppid=2075 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:48:07.756000 audit[2228]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:48:07.756000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc36715d60 a2=0 a3=7ffc36715d4c items=0 ppid=2075 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:48:07.758656 kubelet[1913]: I1213 03:48:07.758635 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-wd5wz" podStartSLOduration=3.445299299 podStartE2EDuration="4.758594578s" podCreationTimestamp="2024-12-13 03:48:03 +0000 UTC" firstStartedPulling="2024-12-13 03:48:05.626774734 +0000 UTC m=+2.343412098" lastFinishedPulling="2024-12-13 03:48:06.940070019 +0000 UTC m=+3.656707377" observedRunningTime="2024-12-13 03:48:07.758365979 +0000 UTC m=+4.475003354" watchObservedRunningTime="2024-12-13 03:48:07.758594578 +0000 UTC m=+4.475231945" Dec 13 03:48:07.759000 audit[2230]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 03:48:07.759000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffff18d5650 a2=0 a3=7ffff18d563c items=0 ppid=2075 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.759000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:07.759000 audit[2230]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 03:48:07.759000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffff18d5650 a2=0 a3=7ffff18d563c items=0 ppid=2075 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:07.759000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:07.846118 kubelet[1913]: E1213 03:48:07.846053 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.846118 kubelet[1913]: W1213 03:48:07.846098 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.846554 kubelet[1913]: E1213 03:48:07.846166 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.846738 kubelet[1913]: E1213 03:48:07.846704 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.846738 kubelet[1913]: W1213 03:48:07.846736 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.847087 kubelet[1913]: E1213 03:48:07.846774 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.847310 kubelet[1913]: E1213 03:48:07.847276 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.847310 kubelet[1913]: W1213 03:48:07.847308 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.847569 kubelet[1913]: E1213 03:48:07.847359 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.847933 kubelet[1913]: E1213 03:48:07.847899 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.847933 kubelet[1913]: W1213 03:48:07.847932 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.848178 kubelet[1913]: E1213 03:48:07.847969 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.848478 kubelet[1913]: E1213 03:48:07.848447 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.848478 kubelet[1913]: W1213 03:48:07.848472 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.848725 kubelet[1913]: E1213 03:48:07.848505 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.849052 kubelet[1913]: E1213 03:48:07.848977 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.849052 kubelet[1913]: W1213 03:48:07.849009 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.849052 kubelet[1913]: E1213 03:48:07.849045 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.849665 kubelet[1913]: E1213 03:48:07.849588 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.849665 kubelet[1913]: W1213 03:48:07.849620 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.849665 kubelet[1913]: E1213 03:48:07.849656 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.850246 kubelet[1913]: E1213 03:48:07.850189 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.850246 kubelet[1913]: W1213 03:48:07.850221 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.850544 kubelet[1913]: E1213 03:48:07.850257 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.850882 kubelet[1913]: E1213 03:48:07.850805 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.850882 kubelet[1913]: W1213 03:48:07.850837 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.850882 kubelet[1913]: E1213 03:48:07.850873 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.851355 kubelet[1913]: E1213 03:48:07.851322 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.851496 kubelet[1913]: W1213 03:48:07.851357 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.851496 kubelet[1913]: E1213 03:48:07.851413 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.851950 kubelet[1913]: E1213 03:48:07.851880 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.851950 kubelet[1913]: W1213 03:48:07.851912 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.851950 kubelet[1913]: E1213 03:48:07.851949 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.852462 kubelet[1913]: E1213 03:48:07.852398 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.852462 kubelet[1913]: W1213 03:48:07.852420 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.852462 kubelet[1913]: E1213 03:48:07.852449 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.852995 kubelet[1913]: E1213 03:48:07.852944 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.852995 kubelet[1913]: W1213 03:48:07.852976 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.853249 kubelet[1913]: E1213 03:48:07.853012 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.853536 kubelet[1913]: E1213 03:48:07.853470 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.853536 kubelet[1913]: W1213 03:48:07.853495 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.853536 kubelet[1913]: E1213 03:48:07.853537 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.854048 kubelet[1913]: E1213 03:48:07.853978 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.854048 kubelet[1913]: W1213 03:48:07.854001 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.854048 kubelet[1913]: E1213 03:48:07.854035 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.854555 kubelet[1913]: E1213 03:48:07.854484 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.854555 kubelet[1913]: W1213 03:48:07.854508 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.854555 kubelet[1913]: E1213 03:48:07.854548 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.855036 kubelet[1913]: E1213 03:48:07.854998 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.855036 kubelet[1913]: W1213 03:48:07.855021 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.855248 kubelet[1913]: E1213 03:48:07.855059 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.855610 kubelet[1913]: E1213 03:48:07.855495 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.855610 kubelet[1913]: W1213 03:48:07.855522 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.855610 kubelet[1913]: E1213 03:48:07.855558 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.856061 kubelet[1913]: E1213 03:48:07.855962 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.856061 kubelet[1913]: W1213 03:48:07.855995 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.856061 kubelet[1913]: E1213 03:48:07.856041 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.856575 kubelet[1913]: E1213 03:48:07.856541 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.856777 kubelet[1913]: W1213 03:48:07.856577 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.856777 kubelet[1913]: E1213 03:48:07.856622 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.857260 kubelet[1913]: E1213 03:48:07.857227 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.857473 kubelet[1913]: W1213 03:48:07.857264 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.857473 kubelet[1913]: E1213 03:48:07.857312 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.857963 kubelet[1913]: E1213 03:48:07.857903 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.857963 kubelet[1913]: W1213 03:48:07.857938 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.858181 kubelet[1913]: E1213 03:48:07.857997 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.858656 kubelet[1913]: E1213 03:48:07.858572 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.858656 kubelet[1913]: W1213 03:48:07.858614 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.859096 kubelet[1913]: E1213 03:48:07.858673 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.859212 kubelet[1913]: E1213 03:48:07.859184 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.859358 kubelet[1913]: W1213 03:48:07.859215 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.859358 kubelet[1913]: E1213 03:48:07.859297 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.859889 kubelet[1913]: E1213 03:48:07.859801 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.859889 kubelet[1913]: W1213 03:48:07.859833 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.860111 kubelet[1913]: E1213 03:48:07.859958 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.860332 kubelet[1913]: E1213 03:48:07.860304 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.860470 kubelet[1913]: W1213 03:48:07.860331 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.860470 kubelet[1913]: E1213 03:48:07.860385 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.860941 kubelet[1913]: E1213 03:48:07.860889 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.860941 kubelet[1913]: W1213 03:48:07.860921 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.861182 kubelet[1913]: E1213 03:48:07.860966 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.861427 kubelet[1913]: E1213 03:48:07.861404 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.861548 kubelet[1913]: W1213 03:48:07.861427 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.861548 kubelet[1913]: E1213 03:48:07.861463 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.862015 kubelet[1913]: E1213 03:48:07.861985 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.862126 kubelet[1913]: W1213 03:48:07.862017 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.862233 kubelet[1913]: E1213 03:48:07.862137 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.862464 kubelet[1913]: E1213 03:48:07.862412 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.862464 kubelet[1913]: W1213 03:48:07.862435 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.862687 kubelet[1913]: E1213 03:48:07.862472 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.863022 kubelet[1913]: E1213 03:48:07.862991 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.863122 kubelet[1913]: W1213 03:48:07.863024 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.863122 kubelet[1913]: E1213 03:48:07.863072 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:07.863557 kubelet[1913]: E1213 03:48:07.863526 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:48:07.863677 kubelet[1913]: W1213 03:48:07.863560 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:48:07.863677 kubelet[1913]: E1213 03:48:07.863618 1913 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:48:08.383754 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount872860928.mount: Deactivated successfully. Dec 13 03:48:08.612860 kubelet[1913]: E1213 03:48:08.612809 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:08.666843 env[1556]: time="2024-12-13T03:48:08.666803164Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:08.667458 env[1556]: time="2024-12-13T03:48:08.667434402Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:08.668006 env[1556]: time="2024-12-13T03:48:08.667994224Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:08.668709 env[1556]: time="2024-12-13T03:48:08.668697560Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:08.668979 env[1556]: time="2024-12-13T03:48:08.668968442Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 03:48:08.669995 env[1556]: time="2024-12-13T03:48:08.669984116Z" level=info msg="CreateContainer within sandbox \"8ea6a2753a24ae66bfb9ac767a93319ec48df466110d6a6300f8379bc107339c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 03:48:08.675425 env[1556]: time="2024-12-13T03:48:08.675393987Z" level=info msg="CreateContainer within sandbox \"8ea6a2753a24ae66bfb9ac767a93319ec48df466110d6a6300f8379bc107339c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"359ab2ee82d7e1b4b52d25d066a9a6bebf082ec9e13aa59f73e07f1dfd9c51a2\"" Dec 13 03:48:08.675644 env[1556]: time="2024-12-13T03:48:08.675627301Z" level=info msg="StartContainer for \"359ab2ee82d7e1b4b52d25d066a9a6bebf082ec9e13aa59f73e07f1dfd9c51a2\"" Dec 13 03:48:08.684152 systemd[1]: Started cri-containerd-359ab2ee82d7e1b4b52d25d066a9a6bebf082ec9e13aa59f73e07f1dfd9c51a2.scope. Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019d6b0 a2=3c a3=7f84d81c1c18 items=0 ppid=1997 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:08.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396162326565383264376531623462353264323564303636613961 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit: BPF prog-id=66 op=LOAD Dec 13 03:48:08.692000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019d9d8 a2=78 a3=c0003aa1a8 items=0 ppid=1997 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:08.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396162326565383264376531623462353264323564303636613961 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit: BPF prog-id=67 op=LOAD Dec 13 03:48:08.692000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019d770 a2=78 a3=c0003aa1f8 items=0 ppid=1997 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:08.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396162326565383264376531623462353264323564303636613961 Dec 13 03:48:08.692000 audit: BPF prog-id=67 op=UNLOAD Dec 13 03:48:08.692000 audit: BPF prog-id=66 op=UNLOAD Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:08.692000 audit: BPF prog-id=68 op=LOAD Dec 13 03:48:08.692000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019dc30 a2=78 a3=c0003aa288 items=0 ppid=1997 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:08.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396162326565383264376531623462353264323564303636613961 Dec 13 03:48:08.698198 env[1556]: time="2024-12-13T03:48:08.698156362Z" level=info msg="StartContainer for \"359ab2ee82d7e1b4b52d25d066a9a6bebf082ec9e13aa59f73e07f1dfd9c51a2\" returns successfully" Dec 13 03:48:08.703856 systemd[1]: cri-containerd-359ab2ee82d7e1b4b52d25d066a9a6bebf082ec9e13aa59f73e07f1dfd9c51a2.scope: Deactivated successfully. Dec 13 03:48:08.714000 audit: BPF prog-id=68 op=UNLOAD Dec 13 03:48:08.737810 kubelet[1913]: E1213 03:48:08.737761 1913 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jtb5l" podUID="794697ba-55b5-4875-b715-3d8e07467cfc" Dec 13 03:48:08.995315 env[1556]: time="2024-12-13T03:48:08.995046460Z" level=info msg="shim disconnected" id=359ab2ee82d7e1b4b52d25d066a9a6bebf082ec9e13aa59f73e07f1dfd9c51a2 Dec 13 03:48:08.995315 env[1556]: time="2024-12-13T03:48:08.995161169Z" level=warning msg="cleaning up after shim disconnected" id=359ab2ee82d7e1b4b52d25d066a9a6bebf082ec9e13aa59f73e07f1dfd9c51a2 namespace=k8s.io Dec 13 03:48:08.995315 env[1556]: time="2024-12-13T03:48:08.995192148Z" level=info msg="cleaning up dead shim" Dec 13 03:48:09.008338 env[1556]: time="2024-12-13T03:48:09.008302318Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:48:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2313 runtime=io.containerd.runc.v2\n" Dec 13 03:48:09.359793 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-359ab2ee82d7e1b4b52d25d066a9a6bebf082ec9e13aa59f73e07f1dfd9c51a2-rootfs.mount: Deactivated successfully. Dec 13 03:48:09.614106 kubelet[1913]: E1213 03:48:09.613912 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:09.759137 env[1556]: time="2024-12-13T03:48:09.759012439Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 03:48:10.614580 kubelet[1913]: E1213 03:48:10.614463 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:10.738379 kubelet[1913]: E1213 03:48:10.738236 1913 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jtb5l" podUID="794697ba-55b5-4875-b715-3d8e07467cfc" Dec 13 03:48:11.615336 kubelet[1913]: E1213 03:48:11.615263 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:12.616012 kubelet[1913]: E1213 03:48:12.615930 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:12.738038 kubelet[1913]: E1213 03:48:12.737990 1913 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jtb5l" podUID="794697ba-55b5-4875-b715-3d8e07467cfc" Dec 13 03:48:13.616774 kubelet[1913]: E1213 03:48:13.616755 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:14.188850 systemd-timesyncd[1502]: Contacted time server [2604:180:f3::4a4]:123 (2.flatcar.pool.ntp.org). Dec 13 03:48:14.188910 systemd-timesyncd[1502]: Initial clock synchronization to Fri 2024-12-13 03:48:14.365563 UTC. Dec 13 03:48:14.373520 env[1556]: time="2024-12-13T03:48:14.373469024Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:14.374231 env[1556]: time="2024-12-13T03:48:14.374217713Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:14.374926 env[1556]: time="2024-12-13T03:48:14.374914455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:14.375910 env[1556]: time="2024-12-13T03:48:14.375896982Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:14.376152 env[1556]: time="2024-12-13T03:48:14.376138009Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 03:48:14.377269 env[1556]: time="2024-12-13T03:48:14.377255250Z" level=info msg="CreateContainer within sandbox \"8ea6a2753a24ae66bfb9ac767a93319ec48df466110d6a6300f8379bc107339c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 03:48:14.382542 env[1556]: time="2024-12-13T03:48:14.382491598Z" level=info msg="CreateContainer within sandbox \"8ea6a2753a24ae66bfb9ac767a93319ec48df466110d6a6300f8379bc107339c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a9dc8fdda7f4abf02ecaa8c240c6ef05c9a6d6a1a03d75ee05ced05428be256e\"" Dec 13 03:48:14.382883 env[1556]: time="2024-12-13T03:48:14.382868510Z" level=info msg="StartContainer for \"a9dc8fdda7f4abf02ecaa8c240c6ef05c9a6d6a1a03d75ee05ced05428be256e\"" Dec 13 03:48:14.392782 systemd[1]: Started cri-containerd-a9dc8fdda7f4abf02ecaa8c240c6ef05c9a6d6a1a03d75ee05ced05428be256e.scope. Dec 13 03:48:14.399000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.427098 kernel: kauditd_printk_skb: 187 callbacks suppressed Dec 13 03:48:14.427197 kernel: audit: type=1400 audit(1734061694.399:497): avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.399000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f68edf888e8 items=0 ppid=1997 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:14.588285 kernel: audit: type=1300 audit(1734061694.399:497): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f68edf888e8 items=0 ppid=1997 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:14.588356 kernel: audit: type=1327 audit(1734061694.399:497): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139646338666464613766346162663032656361613863323430633665 Dec 13 03:48:14.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139646338666464613766346162663032656361613863323430633665 Dec 13 03:48:14.617887 kubelet[1913]: E1213 03:48:14.617865 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:14.399000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.737378 kubelet[1913]: E1213 03:48:14.737361 1913 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jtb5l" podUID="794697ba-55b5-4875-b715-3d8e07467cfc" Dec 13 03:48:14.744032 kernel: audit: type=1400 audit(1734061694.399:498): avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.744081 kernel: audit: type=1400 audit(1734061694.399:498): avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.399000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.399000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.870073 kernel: audit: type=1400 audit(1734061694.399:498): avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.870139 kernel: audit: type=1400 audit(1734061694.399:498): avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.399000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.399000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.938962 env[1556]: time="2024-12-13T03:48:14.938934350Z" level=info msg="StartContainer for \"a9dc8fdda7f4abf02ecaa8c240c6ef05c9a6d6a1a03d75ee05ced05428be256e\" returns successfully" Dec 13 03:48:14.996940 kernel: audit: type=1400 audit(1734061694.399:498): avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.997039 kernel: audit: type=1400 audit(1734061694.399:498): avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.399000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.399000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:15.126394 kernel: audit: type=1400 audit(1734061694.399:498): avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.399000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.399000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.399000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.399000 audit: BPF prog-id=69 op=LOAD Dec 13 03:48:14.399000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00042e108 items=0 ppid=1997 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:14.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139646338666464613766346162663032656361613863323430633665 Dec 13 03:48:14.587000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.587000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.587000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.587000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.587000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.587000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.587000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.587000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.587000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.587000 audit: BPF prog-id=70 op=LOAD Dec 13 03:48:14.587000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00042e158 items=0 ppid=1997 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:14.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139646338666464613766346162663032656361613863323430633665 Dec 13 03:48:14.743000 audit: BPF prog-id=70 op=UNLOAD Dec 13 03:48:14.743000 audit: BPF prog-id=69 op=UNLOAD Dec 13 03:48:14.743000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.743000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.743000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.743000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.743000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.743000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.743000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.743000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.743000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.743000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:14.743000 audit: BPF prog-id=71 op=LOAD Dec 13 03:48:14.743000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00042e1e8 items=0 ppid=1997 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:14.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139646338666464613766346162663032656361613863323430633665 Dec 13 03:48:15.618103 kubelet[1913]: E1213 03:48:15.617999 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:15.737722 env[1556]: time="2024-12-13T03:48:15.737569407Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 03:48:15.741268 systemd[1]: cri-containerd-a9dc8fdda7f4abf02ecaa8c240c6ef05c9a6d6a1a03d75ee05ced05428be256e.scope: Deactivated successfully. Dec 13 03:48:15.741872 systemd[1]: cri-containerd-a9dc8fdda7f4abf02ecaa8c240c6ef05c9a6d6a1a03d75ee05ced05428be256e.scope: Consumed 1.193s CPU time. Dec 13 03:48:15.752000 audit: BPF prog-id=71 op=UNLOAD Dec 13 03:48:15.784270 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a9dc8fdda7f4abf02ecaa8c240c6ef05c9a6d6a1a03d75ee05ced05428be256e-rootfs.mount: Deactivated successfully. Dec 13 03:48:15.808212 kubelet[1913]: I1213 03:48:15.808154 1913 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 03:48:16.301001 env[1556]: time="2024-12-13T03:48:16.300893692Z" level=info msg="shim disconnected" id=a9dc8fdda7f4abf02ecaa8c240c6ef05c9a6d6a1a03d75ee05ced05428be256e Dec 13 03:48:16.301001 env[1556]: time="2024-12-13T03:48:16.300993444Z" level=warning msg="cleaning up after shim disconnected" id=a9dc8fdda7f4abf02ecaa8c240c6ef05c9a6d6a1a03d75ee05ced05428be256e namespace=k8s.io Dec 13 03:48:16.301629 env[1556]: time="2024-12-13T03:48:16.301021044Z" level=info msg="cleaning up dead shim" Dec 13 03:48:16.317200 env[1556]: time="2024-12-13T03:48:16.317102550Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:48:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2385 runtime=io.containerd.runc.v2\n" Dec 13 03:48:16.618849 kubelet[1913]: E1213 03:48:16.618630 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:16.750898 systemd[1]: Created slice kubepods-besteffort-pod794697ba_55b5_4875_b715_3d8e07467cfc.slice. Dec 13 03:48:16.752206 env[1556]: time="2024-12-13T03:48:16.752151935Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jtb5l,Uid:794697ba-55b5-4875-b715-3d8e07467cfc,Namespace:calico-system,Attempt:0,}" Dec 13 03:48:16.774281 env[1556]: time="2024-12-13T03:48:16.774227847Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 03:48:16.784340 env[1556]: time="2024-12-13T03:48:16.784262214Z" level=error msg="Failed to destroy network for sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:48:16.784576 env[1556]: time="2024-12-13T03:48:16.784524776Z" level=error msg="encountered an error cleaning up failed sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:48:16.784576 env[1556]: time="2024-12-13T03:48:16.784559637Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jtb5l,Uid:794697ba-55b5-4875-b715-3d8e07467cfc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:48:16.784769 kubelet[1913]: E1213 03:48:16.784720 1913 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:48:16.784830 kubelet[1913]: E1213 03:48:16.784775 1913 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jtb5l" Dec 13 03:48:16.784830 kubelet[1913]: E1213 03:48:16.784803 1913 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jtb5l" Dec 13 03:48:16.784892 kubelet[1913]: E1213 03:48:16.784857 1913 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-jtb5l_calico-system(794697ba-55b5-4875-b715-3d8e07467cfc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-jtb5l_calico-system(794697ba-55b5-4875-b715-3d8e07467cfc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jtb5l" podUID="794697ba-55b5-4875-b715-3d8e07467cfc" Dec 13 03:48:16.785764 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5-shm.mount: Deactivated successfully. Dec 13 03:48:17.619561 kubelet[1913]: E1213 03:48:17.619437 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:17.778559 kubelet[1913]: I1213 03:48:17.778468 1913 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:48:17.779782 env[1556]: time="2024-12-13T03:48:17.779668271Z" level=info msg="StopPodSandbox for \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\"" Dec 13 03:48:17.808728 env[1556]: time="2024-12-13T03:48:17.808665813Z" level=error msg="StopPodSandbox for \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\" failed" error="failed to destroy network for sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:48:17.808871 kubelet[1913]: E1213 03:48:17.808840 1913 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:48:17.808912 kubelet[1913]: E1213 03:48:17.808887 1913 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5"} Dec 13 03:48:17.808912 kubelet[1913]: E1213 03:48:17.808910 1913 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"794697ba-55b5-4875-b715-3d8e07467cfc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:48:17.808978 kubelet[1913]: E1213 03:48:17.808928 1913 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"794697ba-55b5-4875-b715-3d8e07467cfc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jtb5l" podUID="794697ba-55b5-4875-b715-3d8e07467cfc" Dec 13 03:48:18.620654 kubelet[1913]: E1213 03:48:18.620570 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:19.621807 kubelet[1913]: E1213 03:48:19.621739 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:20.622407 kubelet[1913]: E1213 03:48:20.622282 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:21.101193 kubelet[1913]: I1213 03:48:21.101139 1913 topology_manager.go:215] "Topology Admit Handler" podUID="5dbc7550-83db-45de-92ae-7e7a04b241bc" podNamespace="default" podName="nginx-deployment-6d5f899847-qxb7k" Dec 13 03:48:21.104215 systemd[1]: Created slice kubepods-besteffort-pod5dbc7550_83db_45de_92ae_7e7a04b241bc.slice. Dec 13 03:48:21.252751 kubelet[1913]: I1213 03:48:21.252700 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f7j59\" (UniqueName: \"kubernetes.io/projected/5dbc7550-83db-45de-92ae-7e7a04b241bc-kube-api-access-f7j59\") pod \"nginx-deployment-6d5f899847-qxb7k\" (UID: \"5dbc7550-83db-45de-92ae-7e7a04b241bc\") " pod="default/nginx-deployment-6d5f899847-qxb7k" Dec 13 03:48:21.406022 env[1556]: time="2024-12-13T03:48:21.405912196Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-qxb7k,Uid:5dbc7550-83db-45de-92ae-7e7a04b241bc,Namespace:default,Attempt:0,}" Dec 13 03:48:21.438188 env[1556]: time="2024-12-13T03:48:21.438110987Z" level=error msg="Failed to destroy network for sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:48:21.438432 env[1556]: time="2024-12-13T03:48:21.438358685Z" level=error msg="encountered an error cleaning up failed sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:48:21.438512 env[1556]: time="2024-12-13T03:48:21.438428745Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-qxb7k,Uid:5dbc7550-83db-45de-92ae-7e7a04b241bc,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:48:21.438655 kubelet[1913]: E1213 03:48:21.438613 1913 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:48:21.438655 kubelet[1913]: E1213 03:48:21.438655 1913 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-qxb7k" Dec 13 03:48:21.438739 kubelet[1913]: E1213 03:48:21.438676 1913 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-qxb7k" Dec 13 03:48:21.438739 kubelet[1913]: E1213 03:48:21.438736 1913 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-qxb7k_default(5dbc7550-83db-45de-92ae-7e7a04b241bc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-qxb7k_default(5dbc7550-83db-45de-92ae-7e7a04b241bc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-qxb7k" podUID="5dbc7550-83db-45de-92ae-7e7a04b241bc" Dec 13 03:48:21.439476 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7-shm.mount: Deactivated successfully. Dec 13 03:48:21.623010 kubelet[1913]: E1213 03:48:21.622962 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:21.786943 kubelet[1913]: I1213 03:48:21.786869 1913 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:48:21.787254 env[1556]: time="2024-12-13T03:48:21.787209828Z" level=info msg="StopPodSandbox for \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\"" Dec 13 03:48:21.801789 env[1556]: time="2024-12-13T03:48:21.801726076Z" level=error msg="StopPodSandbox for \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\" failed" error="failed to destroy network for sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:48:21.801883 kubelet[1913]: E1213 03:48:21.801869 1913 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:48:21.801915 kubelet[1913]: E1213 03:48:21.801896 1913 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7"} Dec 13 03:48:21.801936 kubelet[1913]: E1213 03:48:21.801918 1913 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5dbc7550-83db-45de-92ae-7e7a04b241bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:48:21.801998 kubelet[1913]: E1213 03:48:21.801937 1913 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5dbc7550-83db-45de-92ae-7e7a04b241bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-qxb7k" podUID="5dbc7550-83db-45de-92ae-7e7a04b241bc" Dec 13 03:48:22.623543 kubelet[1913]: E1213 03:48:22.623481 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:23.216669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount515233121.mount: Deactivated successfully. Dec 13 03:48:23.238010 env[1556]: time="2024-12-13T03:48:23.237988958Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:23.238611 env[1556]: time="2024-12-13T03:48:23.238598963Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:23.239162 env[1556]: time="2024-12-13T03:48:23.239150750Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:23.240103 env[1556]: time="2024-12-13T03:48:23.240077338Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:23.240294 env[1556]: time="2024-12-13T03:48:23.240280850Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 03:48:23.244339 env[1556]: time="2024-12-13T03:48:23.244325188Z" level=info msg="CreateContainer within sandbox \"8ea6a2753a24ae66bfb9ac767a93319ec48df466110d6a6300f8379bc107339c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 03:48:23.250322 env[1556]: time="2024-12-13T03:48:23.250301800Z" level=info msg="CreateContainer within sandbox \"8ea6a2753a24ae66bfb9ac767a93319ec48df466110d6a6300f8379bc107339c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4c8056719bb39daac0d7d82b2ff150ec7dcb84207b384a63f9ecab6ca64cc029\"" Dec 13 03:48:23.250692 env[1556]: time="2024-12-13T03:48:23.250678999Z" level=info msg="StartContainer for \"4c8056719bb39daac0d7d82b2ff150ec7dcb84207b384a63f9ecab6ca64cc029\"" Dec 13 03:48:23.259502 systemd[1]: Started cri-containerd-4c8056719bb39daac0d7d82b2ff150ec7dcb84207b384a63f9ecab6ca64cc029.scope. Dec 13 03:48:23.267000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.296219 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 03:48:23.296257 kernel: audit: type=1400 audit(1734061703.267:504): avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff3c9b22108 items=0 ppid=1997 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:23.458000 kernel: audit: type=1300 audit(1734061703.267:504): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff3c9b22108 items=0 ppid=1997 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:23.458025 kernel: audit: type=1327 audit(1734061703.267:504): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463383035363731396262333964616163306437643832623266663135 Dec 13 03:48:23.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463383035363731396262333964616163306437643832623266663135 Dec 13 03:48:23.551486 kernel: audit: type=1400 audit(1734061703.267:505): avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.611539 kubelet[1913]: E1213 03:48:23.611498 1913 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:23.615153 kernel: audit: type=1400 audit(1734061703.267:505): avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.624405 kubelet[1913]: E1213 03:48:23.624347 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:23.678803 kernel: audit: type=1400 audit(1734061703.267:505): avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.742432 kernel: audit: type=1400 audit(1734061703.267:505): avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.806424 kernel: audit: type=1400 audit(1734061703.267:505): avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.827064 env[1556]: time="2024-12-13T03:48:23.827007554Z" level=info msg="StartContainer for \"4c8056719bb39daac0d7d82b2ff150ec7dcb84207b384a63f9ecab6ca64cc029\" returns successfully" Dec 13 03:48:23.870524 kernel: audit: type=1400 audit(1734061703.267:505): avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.998580 kernel: audit: type=1400 audit(1734061703.267:505): avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.267000 audit: BPF prog-id=72 op=LOAD Dec 13 03:48:23.267000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002d5c88 items=0 ppid=1997 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:23.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463383035363731396262333964616163306437643832623266663135 Dec 13 03:48:23.456000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.456000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.456000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.456000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.456000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.456000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.456000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.456000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.456000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.456000 audit: BPF prog-id=73 op=LOAD Dec 13 03:48:23.456000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002d5cd8 items=0 ppid=1997 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:23.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463383035363731396262333964616163306437643832623266663135 Dec 13 03:48:23.614000 audit: BPF prog-id=73 op=UNLOAD Dec 13 03:48:23.614000 audit: BPF prog-id=72 op=UNLOAD Dec 13 03:48:23.614000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.614000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.614000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.614000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.614000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.614000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.614000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.614000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.614000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.614000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:23.614000 audit: BPF prog-id=74 op=LOAD Dec 13 03:48:23.614000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002d5d68 items=0 ppid=1997 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:23.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463383035363731396262333964616163306437643832623266663135 Dec 13 03:48:24.082324 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 03:48:24.082367 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 03:48:24.625582 kubelet[1913]: E1213 03:48:24.625466 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:24.817138 kubelet[1913]: I1213 03:48:24.817042 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-pzpfd" podStartSLOduration=4.203661755 podStartE2EDuration="21.816959642s" podCreationTimestamp="2024-12-13 03:48:03 +0000 UTC" firstStartedPulling="2024-12-13 03:48:05.627153644 +0000 UTC m=+2.343791009" lastFinishedPulling="2024-12-13 03:48:23.240451535 +0000 UTC m=+19.957088896" observedRunningTime="2024-12-13 03:48:24.816941412 +0000 UTC m=+21.533578834" watchObservedRunningTime="2024-12-13 03:48:24.816959642 +0000 UTC m=+21.533597057" Dec 13 03:48:25.430000 audit[2686]: AVC avc: denied { write } for pid=2686 comm="tee" name="fd" dev="proc" ino=23971 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:48:25.430000 audit[2686]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb8e94a12 a2=241 a3=1b6 items=1 ppid=2655 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.430000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 03:48:25.430000 audit: PATH item=0 name="/dev/fd/63" inode=14908 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:25.430000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:48:25.430000 audit[2694]: AVC avc: denied { write } for pid=2694 comm="tee" name="fd" dev="proc" ino=29325 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:48:25.430000 audit[2693]: AVC avc: denied { write } for pid=2693 comm="tee" name="fd" dev="proc" ino=20178 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:48:25.430000 audit[2693]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc44037a22 a2=241 a3=1b6 items=1 ppid=2652 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.430000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 03:48:25.430000 audit: PATH item=0 name="/dev/fd/63" inode=31047 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:25.430000 audit[2694]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd473f5a21 a2=241 a3=1b6 items=1 ppid=2658 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.430000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 03:48:25.430000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:48:25.430000 audit: PATH item=0 name="/dev/fd/63" inode=29322 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:25.430000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:48:25.430000 audit[2697]: AVC avc: denied { write } for pid=2697 comm="tee" name="fd" dev="proc" ino=27352 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:48:25.430000 audit[2697]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff3479a23 a2=241 a3=1b6 items=1 ppid=2651 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.430000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 03:48:25.430000 audit: PATH item=0 name="/dev/fd/63" inode=31048 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:25.430000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:48:25.430000 audit[2699]: AVC avc: denied { write } for pid=2699 comm="tee" name="fd" dev="proc" ino=14911 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:48:25.430000 audit[2699]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd37c2fa11 a2=241 a3=1b6 items=1 ppid=2657 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.430000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 03:48:25.430000 audit: PATH item=0 name="/dev/fd/63" inode=16380 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:25.430000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:48:25.430000 audit[2696]: AVC avc: denied { write } for pid=2696 comm="tee" name="fd" dev="proc" ino=31933 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:48:25.430000 audit[2696]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc02ea3a21 a2=241 a3=1b6 items=1 ppid=2656 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.430000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 03:48:25.430000 audit: PATH item=0 name="/dev/fd/63" inode=16379 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:25.430000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:48:25.431000 audit[2687]: AVC avc: denied { write } for pid=2687 comm="tee" name="fd" dev="proc" ino=13296 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:48:25.431000 audit[2687]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf560da21 a2=241 a3=1b6 items=1 ppid=2653 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.431000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 03:48:25.431000 audit: PATH item=0 name="/dev/fd/63" inode=20175 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:25.431000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:48:25.507000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.507000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.507000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.507000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.507000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.507000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.507000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.507000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.507000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.507000 audit: BPF prog-id=75 op=LOAD Dec 13 03:48:25.507000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9b38a060 a2=98 a3=3 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.507000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.507000 audit: BPF prog-id=75 op=UNLOAD Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit: BPF prog-id=76 op=LOAD Dec 13 03:48:25.508000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff9b389e40 a2=74 a3=540051 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.508000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.508000 audit: BPF prog-id=76 op=UNLOAD Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.508000 audit: BPF prog-id=77 op=LOAD Dec 13 03:48:25.508000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff9b389e70 a2=94 a3=2 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.508000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.508000 audit: BPF prog-id=77 op=UNLOAD Dec 13 03:48:25.615000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.615000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.615000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.615000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.615000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.615000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.615000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.615000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.615000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.615000 audit: BPF prog-id=78 op=LOAD Dec 13 03:48:25.615000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff9b389d30 a2=40 a3=1 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.615000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.615000 audit: BPF prog-id=78 op=UNLOAD Dec 13 03:48:25.615000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.615000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff9b389e00 a2=50 a3=7fff9b389ee0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.615000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9b389d40 a2=28 a3=0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9b389d70 a2=28 a3=0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9b389c80 a2=28 a3=0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9b389d90 a2=28 a3=0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9b389d70 a2=28 a3=0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9b389d60 a2=28 a3=0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9b389d90 a2=28 a3=0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9b389d70 a2=28 a3=0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9b389d90 a2=28 a3=0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9b389d60 a2=28 a3=0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9b389dd0 a2=28 a3=0 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff9b389b80 a2=50 a3=1 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit: BPF prog-id=79 op=LOAD Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9b389b80 a2=94 a3=5 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit: BPF prog-id=79 op=UNLOAD Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff9b389c30 a2=50 a3=1 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff9b389d50 a2=4 a3=38 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.621000 audit[2800]: AVC avc: denied { confidentiality } for pid=2800 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:25.621000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff9b389da0 a2=94 a3=6 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.621000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { confidentiality } for pid=2800 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:25.622000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff9b389550 a2=94 a3=83 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.622000 audit[2800]: AVC avc: denied { confidentiality } for pid=2800 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:25.622000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff9b389550 a2=94 a3=83 items=0 ppid=2664 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit: BPF prog-id=80 op=LOAD Dec 13 03:48:25.625000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd32808900 a2=98 a3=1999999999999999 items=0 ppid=2664 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.625000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:48:25.625000 audit: BPF prog-id=80 op=UNLOAD Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit: BPF prog-id=81 op=LOAD Dec 13 03:48:25.625000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd328087e0 a2=74 a3=ffff items=0 ppid=2664 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.625000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:48:25.625000 audit: BPF prog-id=81 op=UNLOAD Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.625000 audit: BPF prog-id=82 op=LOAD Dec 13 03:48:25.625000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd32808820 a2=40 a3=7ffd32808a00 items=0 ppid=2664 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.625000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:48:25.625000 audit: BPF prog-id=82 op=UNLOAD Dec 13 03:48:25.627187 kubelet[1913]: E1213 03:48:25.626195 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:25.659243 systemd-networkd[1308]: vxlan.calico: Link UP Dec 13 03:48:25.659246 systemd-networkd[1308]: vxlan.calico: Gained carrier Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit: BPF prog-id=83 op=LOAD Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbd0acf00 a2=98 a3=ffffffff items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit: BPF prog-id=83 op=UNLOAD Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit: BPF prog-id=84 op=LOAD Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbd0acd10 a2=74 a3=540051 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit: BPF prog-id=84 op=UNLOAD Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit: BPF prog-id=85 op=LOAD Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbd0acd40 a2=94 a3=2 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit: BPF prog-id=85 op=UNLOAD Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbd0acc10 a2=28 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbd0acc40 a2=28 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbd0acb50 a2=28 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbd0acc60 a2=28 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbd0acc40 a2=28 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbd0acc30 a2=28 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbd0acc60 a2=28 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbd0acc40 a2=28 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbd0acc60 a2=28 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbd0acc30 a2=28 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbd0acca0 a2=28 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.668000 audit: BPF prog-id=86 op=LOAD Dec 13 03:48:25.668000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbd0acb10 a2=40 a3=0 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.668000 audit: BPF prog-id=86 op=UNLOAD Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcbd0acb00 a2=50 a3=2800 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcbd0acb00 a2=50 a3=2800 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit: BPF prog-id=87 op=LOAD Dec 13 03:48:25.669000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbd0ac320 a2=94 a3=2 items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.669000 audit: BPF prog-id=87 op=UNLOAD Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.669000 audit: BPF prog-id=88 op=LOAD Dec 13 03:48:25.669000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbd0ac420 a2=94 a3=2d items=0 ppid=2664 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.669000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit: BPF prog-id=89 op=LOAD Dec 13 03:48:25.670000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9e3cfd60 a2=98 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.670000 audit: BPF prog-id=89 op=UNLOAD Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit: BPF prog-id=90 op=LOAD Dec 13 03:48:25.670000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff9e3cfb40 a2=74 a3=540051 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.670000 audit: BPF prog-id=90 op=UNLOAD Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.670000 audit: BPF prog-id=91 op=LOAD Dec 13 03:48:25.670000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff9e3cfb70 a2=94 a3=2 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.670000 audit: BPF prog-id=91 op=UNLOAD Dec 13 03:48:25.751000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.751000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.751000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.751000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.751000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.751000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.751000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.751000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.751000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.751000 audit: BPF prog-id=92 op=LOAD Dec 13 03:48:25.751000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff9e3cfa30 a2=40 a3=1 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.751000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.751000 audit: BPF prog-id=92 op=UNLOAD Dec 13 03:48:25.751000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.751000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff9e3cfb00 a2=50 a3=7fff9e3cfbe0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.751000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9e3cfa40 a2=28 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9e3cfa70 a2=28 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9e3cf980 a2=28 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9e3cfa90 a2=28 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9e3cfa70 a2=28 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9e3cfa60 a2=28 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9e3cfa90 a2=28 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9e3cfa70 a2=28 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9e3cfa90 a2=28 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9e3cfa60 a2=28 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9e3cfad0 a2=28 a3=0 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff9e3cf880 a2=50 a3=1 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit: BPF prog-id=93 op=LOAD Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9e3cf880 a2=94 a3=5 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit: BPF prog-id=93 op=UNLOAD Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff9e3cf930 a2=50 a3=1 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff9e3cfa50 a2=4 a3=38 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.759000 audit[2835]: AVC avc: denied { confidentiality } for pid=2835 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:25.759000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff9e3cfaa0 a2=94 a3=6 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { confidentiality } for pid=2835 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:25.760000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff9e3cf250 a2=94 a3=83 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { confidentiality } for pid=2835 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:25.760000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff9e3cf250 a2=94 a3=83 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff9e3d0c90 a2=10 a3=f1f00800 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff9e3d0b30 a2=10 a3=3 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff9e3d0ad0 a2=10 a3=3 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.760000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:25.760000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff9e3d0ad0 a2=10 a3=7 items=0 ppid=2664 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:48:25.771000 audit: BPF prog-id=88 op=UNLOAD Dec 13 03:48:25.799371 kubelet[1913]: I1213 03:48:25.799355 1913 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 03:48:25.805000 audit[2893]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2893 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:48:25.805000 audit[2893]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd2cb167b0 a2=0 a3=7ffd2cb1679c items=0 ppid=2664 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.805000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:48:25.808000 audit[2891]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:48:25.808000 audit[2891]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffcc4f40980 a2=0 a3=7ffcc4f4096c items=0 ppid=2664 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.808000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:48:25.810000 audit[2896]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:48:25.810000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdfd8fedb0 a2=0 a3=7ffdfd8fed9c items=0 ppid=2664 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.810000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:48:25.812000 audit[2892]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:48:25.812000 audit[2892]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe1a02f360 a2=0 a3=7ffe1a02f34c items=0 ppid=2664 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:25.812000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:48:26.627298 kubelet[1913]: E1213 03:48:26.627217 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:27.113870 systemd-networkd[1308]: vxlan.calico: Gained IPv6LL Dec 13 03:48:27.628181 kubelet[1913]: E1213 03:48:27.628098 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:27.982276 update_engine[1552]: I1213 03:48:27.982049 1552 update_attempter.cc:509] Updating boot flags... Dec 13 03:48:28.629089 kubelet[1913]: E1213 03:48:28.629010 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:29.629584 kubelet[1913]: E1213 03:48:29.629472 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:30.630545 kubelet[1913]: E1213 03:48:30.630439 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:31.630731 kubelet[1913]: E1213 03:48:31.630607 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:31.739158 env[1556]: time="2024-12-13T03:48:31.739022210Z" level=info msg="StopPodSandbox for \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\"" Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.777 [INFO][2940] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.777 [INFO][2940] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" iface="eth0" netns="/var/run/netns/cni-464e52d6-7d39-64c6-838d-ffc8404af953" Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.777 [INFO][2940] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" iface="eth0" netns="/var/run/netns/cni-464e52d6-7d39-64c6-838d-ffc8404af953" Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.777 [INFO][2940] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" iface="eth0" netns="/var/run/netns/cni-464e52d6-7d39-64c6-838d-ffc8404af953" Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.777 [INFO][2940] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.778 [INFO][2940] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.788 [INFO][2953] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" HandleID="k8s-pod-network.70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.788 [INFO][2953] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.788 [INFO][2953] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.792 [WARNING][2953] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" HandleID="k8s-pod-network.70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.792 [INFO][2953] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" HandleID="k8s-pod-network.70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.794 [INFO][2953] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:48:31.796569 env[1556]: 2024-12-13 03:48:31.795 [INFO][2940] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:48:31.796969 env[1556]: time="2024-12-13T03:48:31.796617991Z" level=info msg="TearDown network for sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\" successfully" Dec 13 03:48:31.796969 env[1556]: time="2024-12-13T03:48:31.796644562Z" level=info msg="StopPodSandbox for \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\" returns successfully" Dec 13 03:48:31.797129 env[1556]: time="2024-12-13T03:48:31.797109212Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jtb5l,Uid:794697ba-55b5-4875-b715-3d8e07467cfc,Namespace:calico-system,Attempt:1,}" Dec 13 03:48:31.798296 systemd[1]: run-netns-cni\x2d464e52d6\x2d7d39\x2d64c6\x2d838d\x2dffc8404af953.mount: Deactivated successfully. Dec 13 03:48:31.881928 systemd-networkd[1308]: cali30f836e0b9a: Link UP Dec 13 03:48:31.951509 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:48:31.951550 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali30f836e0b9a: link becomes ready Dec 13 03:48:31.951555 systemd-networkd[1308]: cali30f836e0b9a: Gained carrier Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.823 [INFO][2966] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.37-k8s-csi--node--driver--jtb5l-eth0 csi-node-driver- calico-system 794697ba-55b5-4875-b715-3d8e07467cfc 1674 0 2024-12-13 03:48:03 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.80.37 csi-node-driver-jtb5l eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali30f836e0b9a [] []}} ContainerID="5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" Namespace="calico-system" Pod="csi-node-driver-jtb5l" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--jtb5l-" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.823 [INFO][2966] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" Namespace="calico-system" Pod="csi-node-driver-jtb5l" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.844 [INFO][2988] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" HandleID="k8s-pod-network.5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.851 [INFO][2988] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" HandleID="k8s-pod-network.5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003394e0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.37", "pod":"csi-node-driver-jtb5l", "timestamp":"2024-12-13 03:48:31.844138205 +0000 UTC"}, Hostname:"10.67.80.37", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.851 [INFO][2988] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.851 [INFO][2988] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.851 [INFO][2988] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.37' Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.852 [INFO][2988] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" host="10.67.80.37" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.856 [INFO][2988] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.37" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.860 [INFO][2988] ipam/ipam.go 489: Trying affinity for 192.168.81.0/26 host="10.67.80.37" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.861 [INFO][2988] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.0/26 host="10.67.80.37" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.863 [INFO][2988] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.0/26 host="10.67.80.37" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.863 [INFO][2988] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.0/26 handle="k8s-pod-network.5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" host="10.67.80.37" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.865 [INFO][2988] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.867 [INFO][2988] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.0/26 handle="k8s-pod-network.5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" host="10.67.80.37" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.872 [INFO][2988] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.1/26] block=192.168.81.0/26 handle="k8s-pod-network.5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" host="10.67.80.37" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.872 [INFO][2988] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.1/26] handle="k8s-pod-network.5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" host="10.67.80.37" Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.872 [INFO][2988] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:48:31.957928 env[1556]: 2024-12-13 03:48:31.872 [INFO][2988] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.1/26] IPv6=[] ContainerID="5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" HandleID="k8s-pod-network.5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:48:31.958432 env[1556]: 2024-12-13 03:48:31.877 [INFO][2966] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" Namespace="calico-system" Pod="csi-node-driver-jtb5l" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-csi--node--driver--jtb5l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"794697ba-55b5-4875-b715-3d8e07467cfc", ResourceVersion:"1674", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"", Pod:"csi-node-driver-jtb5l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali30f836e0b9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:48:31.958432 env[1556]: 2024-12-13 03:48:31.878 [INFO][2966] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.1/32] ContainerID="5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" Namespace="calico-system" Pod="csi-node-driver-jtb5l" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:48:31.958432 env[1556]: 2024-12-13 03:48:31.878 [INFO][2966] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali30f836e0b9a ContainerID="5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" Namespace="calico-system" Pod="csi-node-driver-jtb5l" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:48:31.958432 env[1556]: 2024-12-13 03:48:31.951 [INFO][2966] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" Namespace="calico-system" Pod="csi-node-driver-jtb5l" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:48:31.958432 env[1556]: 2024-12-13 03:48:31.951 [INFO][2966] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" Namespace="calico-system" Pod="csi-node-driver-jtb5l" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-csi--node--driver--jtb5l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"794697ba-55b5-4875-b715-3d8e07467cfc", ResourceVersion:"1674", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b", Pod:"csi-node-driver-jtb5l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali30f836e0b9a", MAC:"f2:4e:ef:14:8b:1c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:48:31.958432 env[1556]: 2024-12-13 03:48:31.957 [INFO][2966] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b" Namespace="calico-system" Pod="csi-node-driver-jtb5l" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:48:31.961000 audit[3021]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:48:31.963276 env[1556]: time="2024-12-13T03:48:31.963223527Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:48:31.963276 env[1556]: time="2024-12-13T03:48:31.963244386Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:48:31.963276 env[1556]: time="2024-12-13T03:48:31.963251021Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:48:31.963357 env[1556]: time="2024-12-13T03:48:31.963311427Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b pid=3024 runtime=io.containerd.runc.v2 Dec 13 03:48:31.969512 systemd[1]: Started cri-containerd-5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b.scope. Dec 13 03:48:31.989115 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 03:48:31.989153 kernel: audit: type=1325 audit(1734061711.961:612): table=filter:69 family=2 entries=34 op=nft_register_chain pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:48:31.961000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffff2fce820 a2=0 a3=7ffff2fce80c items=0 ppid=2664 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:32.142972 kernel: audit: type=1300 audit(1734061711.961:612): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffff2fce820 a2=0 a3=7ffff2fce80c items=0 ppid=2664 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:32.143033 kernel: audit: type=1327 audit(1734061711.961:612): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:48:31.961000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:48:32.203783 kernel: audit: type=1400 audit(1734061712.051:613): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.266232 kernel: audit: type=1400 audit(1734061712.051:614): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.328578 kernel: audit: type=1400 audit(1734061712.051:615): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.390967 kernel: audit: type=1400 audit(1734061712.051:616): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.453642 kernel: audit: type=1400 audit(1734061712.051:617): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.516389 kernel: audit: type=1400 audit(1734061712.051:618): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.579065 kernel: audit: type=1400 audit(1734061712.051:619): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.631414 kubelet[1913]: E1213 03:48:32.631365 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:32.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit: BPF prog-id=94 op=LOAD Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3024 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:32.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333162386430636439623737396165626162373537313739393465 Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3024 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:32.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333162386430636439623737396165626162373537313739393465 Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.203000 audit: BPF prog-id=95 op=LOAD Dec 13 03:48:32.203000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000288e90 items=0 ppid=3024 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:32.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333162386430636439623737396165626162373537313739393465 Dec 13 03:48:32.328000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.328000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.328000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.328000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.328000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.328000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.328000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.328000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.328000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.328000 audit: BPF prog-id=96 op=LOAD Dec 13 03:48:32.328000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000288ed8 items=0 ppid=3024 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:32.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333162386430636439623737396165626162373537313739393465 Dec 13 03:48:32.452000 audit: BPF prog-id=96 op=UNLOAD Dec 13 03:48:32.452000 audit: BPF prog-id=95 op=UNLOAD Dec 13 03:48:32.452000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.452000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.452000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.452000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.452000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.452000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.452000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.452000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.452000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.452000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:32.452000 audit: BPF prog-id=97 op=LOAD Dec 13 03:48:32.452000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002892e8 items=0 ppid=3024 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:32.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333162386430636439623737396165626162373537313739393465 Dec 13 03:48:32.646478 env[1556]: time="2024-12-13T03:48:32.646454319Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jtb5l,Uid:794697ba-55b5-4875-b715-3d8e07467cfc,Namespace:calico-system,Attempt:1,} returns sandbox id \"5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b\"" Dec 13 03:48:32.647138 env[1556]: time="2024-12-13T03:48:32.647126801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 03:48:33.001895 systemd-networkd[1308]: cali30f836e0b9a: Gained IPv6LL Dec 13 03:48:33.632429 kubelet[1913]: E1213 03:48:33.632325 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:34.159560 env[1556]: time="2024-12-13T03:48:34.159506247Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:34.160154 env[1556]: time="2024-12-13T03:48:34.160119071Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:34.160814 env[1556]: time="2024-12-13T03:48:34.160764054Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:34.161437 env[1556]: time="2024-12-13T03:48:34.161380959Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:34.162060 env[1556]: time="2024-12-13T03:48:34.162016941Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 03:48:34.162914 env[1556]: time="2024-12-13T03:48:34.162878637Z" level=info msg="CreateContainer within sandbox \"5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 03:48:34.168800 env[1556]: time="2024-12-13T03:48:34.168760930Z" level=info msg="CreateContainer within sandbox \"5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e76d05cfd7fb2b9b2cbc6076e4c2922cf3907a789cfaaae085f07b5240a47e66\"" Dec 13 03:48:34.169202 env[1556]: time="2024-12-13T03:48:34.169124699Z" level=info msg="StartContainer for \"e76d05cfd7fb2b9b2cbc6076e4c2922cf3907a789cfaaae085f07b5240a47e66\"" Dec 13 03:48:34.180565 systemd[1]: Started cri-containerd-e76d05cfd7fb2b9b2cbc6076e4c2922cf3907a789cfaaae085f07b5240a47e66.scope. Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa84051e1a8 items=0 ppid=3024 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:34.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366430356366643766623262396232636263363037366534633239 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit: BPF prog-id=98 op=LOAD Dec 13 03:48:34.187000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f7f68 items=0 ppid=3024 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:34.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366430356366643766623262396232636263363037366534633239 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit: BPF prog-id=99 op=LOAD Dec 13 03:48:34.187000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f7fb8 items=0 ppid=3024 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:34.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366430356366643766623262396232636263363037366534633239 Dec 13 03:48:34.187000 audit: BPF prog-id=99 op=UNLOAD Dec 13 03:48:34.187000 audit: BPF prog-id=98 op=UNLOAD Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:34.187000 audit: BPF prog-id=100 op=LOAD Dec 13 03:48:34.187000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e0048 items=0 ppid=3024 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:34.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366430356366643766623262396232636263363037366534633239 Dec 13 03:48:34.193557 env[1556]: time="2024-12-13T03:48:34.193508050Z" level=info msg="StartContainer for \"e76d05cfd7fb2b9b2cbc6076e4c2922cf3907a789cfaaae085f07b5240a47e66\" returns successfully" Dec 13 03:48:34.194241 env[1556]: time="2024-12-13T03:48:34.194176474Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 03:48:34.633167 kubelet[1913]: E1213 03:48:34.633066 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:34.705720 kubelet[1913]: I1213 03:48:34.705593 1913 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 03:48:35.633876 kubelet[1913]: E1213 03:48:35.633812 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:35.738143 env[1556]: time="2024-12-13T03:48:35.738119907Z" level=info msg="StopPodSandbox for \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\"" Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.777 [INFO][3158] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.777 [INFO][3158] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" iface="eth0" netns="/var/run/netns/cni-ef56a48a-2e49-60ac-cb0c-7571f15f95f9" Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.777 [INFO][3158] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" iface="eth0" netns="/var/run/netns/cni-ef56a48a-2e49-60ac-cb0c-7571f15f95f9" Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.777 [INFO][3158] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" iface="eth0" netns="/var/run/netns/cni-ef56a48a-2e49-60ac-cb0c-7571f15f95f9" Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.777 [INFO][3158] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.777 [INFO][3158] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.788 [INFO][3175] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" HandleID="k8s-pod-network.ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.788 [INFO][3175] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.788 [INFO][3175] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.799 [WARNING][3175] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" HandleID="k8s-pod-network.ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.799 [INFO][3175] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" HandleID="k8s-pod-network.ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.801 [INFO][3175] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:48:35.803090 env[1556]: 2024-12-13 03:48:35.802 [INFO][3158] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:48:35.803583 env[1556]: time="2024-12-13T03:48:35.803178792Z" level=info msg="TearDown network for sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\" successfully" Dec 13 03:48:35.803583 env[1556]: time="2024-12-13T03:48:35.803204332Z" level=info msg="StopPodSandbox for \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\" returns successfully" Dec 13 03:48:35.803755 env[1556]: time="2024-12-13T03:48:35.803740706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-qxb7k,Uid:5dbc7550-83db-45de-92ae-7e7a04b241bc,Namespace:default,Attempt:1,}" Dec 13 03:48:35.804424 systemd[1]: run-netns-cni\x2def56a48a\x2d2e49\x2d60ac\x2dcb0c\x2d7571f15f95f9.mount: Deactivated successfully. Dec 13 03:48:35.856750 env[1556]: time="2024-12-13T03:48:35.856718986Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:35.857314 env[1556]: time="2024-12-13T03:48:35.857297976Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:35.857938 env[1556]: time="2024-12-13T03:48:35.857926306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:35.870172 env[1556]: time="2024-12-13T03:48:35.870154239Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:35.870490 env[1556]: time="2024-12-13T03:48:35.870475365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 03:48:35.871416 env[1556]: time="2024-12-13T03:48:35.871401488Z" level=info msg="CreateContainer within sandbox \"5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 03:48:35.878270 env[1556]: time="2024-12-13T03:48:35.878221910Z" level=info msg="CreateContainer within sandbox \"5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b71d081d2060f0c4b27cf16b1a99f04a384cc53d754c12423b22fd88235269b8\"" Dec 13 03:48:35.878494 env[1556]: time="2024-12-13T03:48:35.878453238Z" level=info msg="StartContainer for \"b71d081d2060f0c4b27cf16b1a99f04a384cc53d754c12423b22fd88235269b8\"" Dec 13 03:48:35.886239 systemd[1]: Started cri-containerd-b71d081d2060f0c4b27cf16b1a99f04a384cc53d754c12423b22fd88235269b8.scope. Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fb549f3e718 items=0 ppid=3024 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:35.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316430383164323036306630633462323763663136623161393966 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit: BPF prog-id=101 op=LOAD Dec 13 03:48:35.893000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000291228 items=0 ppid=3024 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:35.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316430383164323036306630633462323763663136623161393966 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit: BPF prog-id=102 op=LOAD Dec 13 03:48:35.893000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000291278 items=0 ppid=3024 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:35.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316430383164323036306630633462323763663136623161393966 Dec 13 03:48:35.893000 audit: BPF prog-id=102 op=UNLOAD Dec 13 03:48:35.893000 audit: BPF prog-id=101 op=UNLOAD Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.893000 audit: BPF prog-id=103 op=LOAD Dec 13 03:48:35.893000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000291308 items=0 ppid=3024 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:35.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237316430383164323036306630633462323763663136623161393966 Dec 13 03:48:35.899596 env[1556]: time="2024-12-13T03:48:35.899542548Z" level=info msg="StartContainer for \"b71d081d2060f0c4b27cf16b1a99f04a384cc53d754c12423b22fd88235269b8\" returns successfully" Dec 13 03:48:35.915132 systemd-networkd[1308]: cali3521822769b: Link UP Dec 13 03:48:35.970396 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:48:35.970443 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3521822769b: link becomes ready Dec 13 03:48:35.970479 systemd-networkd[1308]: cali3521822769b: Gained carrier Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.835 [INFO][3193] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0 nginx-deployment-6d5f899847- default 5dbc7550-83db-45de-92ae-7e7a04b241bc 1696 0 2024-12-13 03:48:21 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.37 nginx-deployment-6d5f899847-qxb7k eth0 default [] [] [kns.default ksa.default.default] cali3521822769b [] []}} ContainerID="83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" Namespace="default" Pod="nginx-deployment-6d5f899847-qxb7k" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.835 [INFO][3193] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" Namespace="default" Pod="nginx-deployment-6d5f899847-qxb7k" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.853 [INFO][3218] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" HandleID="k8s-pod-network.83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.869 [INFO][3218] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" HandleID="k8s-pod-network.83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000361a00), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.37", "pod":"nginx-deployment-6d5f899847-qxb7k", "timestamp":"2024-12-13 03:48:35.853293694 +0000 UTC"}, Hostname:"10.67.80.37", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.869 [INFO][3218] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.869 [INFO][3218] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.869 [INFO][3218] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.37' Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.872 [INFO][3218] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" host="10.67.80.37" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.879 [INFO][3218] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.37" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.887 [INFO][3218] ipam/ipam.go 489: Trying affinity for 192.168.81.0/26 host="10.67.80.37" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.890 [INFO][3218] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.0/26 host="10.67.80.37" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.894 [INFO][3218] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.0/26 host="10.67.80.37" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.894 [INFO][3218] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.0/26 handle="k8s-pod-network.83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" host="10.67.80.37" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.897 [INFO][3218] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5 Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.903 [INFO][3218] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.0/26 handle="k8s-pod-network.83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" host="10.67.80.37" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.912 [INFO][3218] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.2/26] block=192.168.81.0/26 handle="k8s-pod-network.83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" host="10.67.80.37" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.912 [INFO][3218] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.2/26] handle="k8s-pod-network.83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" host="10.67.80.37" Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.912 [INFO][3218] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:48:35.980637 env[1556]: 2024-12-13 03:48:35.912 [INFO][3218] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.2/26] IPv6=[] ContainerID="83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" HandleID="k8s-pod-network.83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:48:35.981038 env[1556]: 2024-12-13 03:48:35.913 [INFO][3193] cni-plugin/k8s.go 386: Populated endpoint ContainerID="83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" Namespace="default" Pod="nginx-deployment-6d5f899847-qxb7k" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5dbc7550-83db-45de-92ae-7e7a04b241bc", ResourceVersion:"1696", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"", Pod:"nginx-deployment-6d5f899847-qxb7k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3521822769b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:48:35.981038 env[1556]: 2024-12-13 03:48:35.914 [INFO][3193] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.2/32] ContainerID="83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" Namespace="default" Pod="nginx-deployment-6d5f899847-qxb7k" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:48:35.981038 env[1556]: 2024-12-13 03:48:35.914 [INFO][3193] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3521822769b ContainerID="83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" Namespace="default" Pod="nginx-deployment-6d5f899847-qxb7k" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:48:35.981038 env[1556]: 2024-12-13 03:48:35.970 [INFO][3193] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" Namespace="default" Pod="nginx-deployment-6d5f899847-qxb7k" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:48:35.981038 env[1556]: 2024-12-13 03:48:35.970 [INFO][3193] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" Namespace="default" Pod="nginx-deployment-6d5f899847-qxb7k" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5dbc7550-83db-45de-92ae-7e7a04b241bc", ResourceVersion:"1696", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5", Pod:"nginx-deployment-6d5f899847-qxb7k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3521822769b", MAC:"5a:96:13:95:42:fb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:48:35.981038 env[1556]: 2024-12-13 03:48:35.979 [INFO][3193] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5" Namespace="default" Pod="nginx-deployment-6d5f899847-qxb7k" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:48:35.986159 env[1556]: time="2024-12-13T03:48:35.986127656Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:48:35.986159 env[1556]: time="2024-12-13T03:48:35.986147937Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:48:35.986159 env[1556]: time="2024-12-13T03:48:35.986155597Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:48:35.986283 env[1556]: time="2024-12-13T03:48:35.986222459Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5 pid=3298 runtime=io.containerd.runc.v2 Dec 13 03:48:35.986000 audit[3299]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=3299 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:48:35.986000 audit[3299]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffc47dfa160 a2=0 a3=7ffc47dfa14c items=0 ppid=2664 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:35.986000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:48:35.991891 systemd[1]: Started cri-containerd-83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5.scope. Dec 13 03:48:35.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.997000 audit: BPF prog-id=104 op=LOAD Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3298 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:35.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833646265633836313762666136303931386534313731313837323035 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3298 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:35.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833646265633836313762666136303931386534313731313837323035 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit: BPF prog-id=105 op=LOAD Dec 13 03:48:35.998000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000259ce0 items=0 ppid=3298 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:35.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833646265633836313762666136303931386534313731313837323035 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit: BPF prog-id=106 op=LOAD Dec 13 03:48:35.998000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000259d28 items=0 ppid=3298 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:35.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833646265633836313762666136303931386534313731313837323035 Dec 13 03:48:35.998000 audit: BPF prog-id=106 op=UNLOAD Dec 13 03:48:35.998000 audit: BPF prog-id=105 op=UNLOAD Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:35.998000 audit: BPF prog-id=107 op=LOAD Dec 13 03:48:35.998000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003da138 items=0 ppid=3298 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:35.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833646265633836313762666136303931386534313731313837323035 Dec 13 03:48:36.013904 env[1556]: time="2024-12-13T03:48:36.013878312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-qxb7k,Uid:5dbc7550-83db-45de-92ae-7e7a04b241bc,Namespace:default,Attempt:1,} returns sandbox id \"83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5\"" Dec 13 03:48:36.014502 env[1556]: time="2024-12-13T03:48:36.014486727Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 03:48:36.635141 kubelet[1913]: E1213 03:48:36.635028 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:36.678717 kubelet[1913]: I1213 03:48:36.678611 1913 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 03:48:36.678717 kubelet[1913]: I1213 03:48:36.678700 1913 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 03:48:36.845778 kubelet[1913]: I1213 03:48:36.845680 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-jtb5l" podStartSLOduration=30.621929096 podStartE2EDuration="33.845590439s" podCreationTimestamp="2024-12-13 03:48:03 +0000 UTC" firstStartedPulling="2024-12-13 03:48:32.646999814 +0000 UTC m=+29.363637171" lastFinishedPulling="2024-12-13 03:48:35.870661155 +0000 UTC m=+32.587298514" observedRunningTime="2024-12-13 03:48:36.84520013 +0000 UTC m=+33.561837574" watchObservedRunningTime="2024-12-13 03:48:36.845590439 +0000 UTC m=+33.562227849" Dec 13 03:48:37.635903 kubelet[1913]: E1213 03:48:37.635827 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:37.993517 systemd-networkd[1308]: cali3521822769b: Gained IPv6LL Dec 13 03:48:38.184114 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4037356890.mount: Deactivated successfully. Dec 13 03:48:38.636849 kubelet[1913]: E1213 03:48:38.636785 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:39.637259 kubelet[1913]: E1213 03:48:39.637203 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:39.661104 env[1556]: time="2024-12-13T03:48:39.661050177Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:39.661710 env[1556]: time="2024-12-13T03:48:39.661671840Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:39.662787 env[1556]: time="2024-12-13T03:48:39.662741176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:39.664061 env[1556]: time="2024-12-13T03:48:39.664019182Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:39.664385 env[1556]: time="2024-12-13T03:48:39.664355780Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 03:48:39.665622 env[1556]: time="2024-12-13T03:48:39.665605107Z" level=info msg="CreateContainer within sandbox \"83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 03:48:39.670178 env[1556]: time="2024-12-13T03:48:39.670134654Z" level=info msg="CreateContainer within sandbox \"83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"78d5435809dce4347c99eb3c215a242906d17e084abe14bc224e9be3b6f840b3\"" Dec 13 03:48:39.670430 env[1556]: time="2024-12-13T03:48:39.670397980Z" level=info msg="StartContainer for \"78d5435809dce4347c99eb3c215a242906d17e084abe14bc224e9be3b6f840b3\"" Dec 13 03:48:39.672181 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount527393220.mount: Deactivated successfully. Dec 13 03:48:39.680233 systemd[1]: Started cri-containerd-78d5435809dce4347c99eb3c215a242906d17e084abe14bc224e9be3b6f840b3.scope. Dec 13 03:48:39.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.711875 kernel: kauditd_printk_skb: 196 callbacks suppressed Dec 13 03:48:39.711949 kernel: audit: type=1400 audit(1734061719.685:662): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.835753 kernel: audit: type=1400 audit(1734061719.685:663): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.835784 kernel: audit: type=1400 audit(1734061719.685:664): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.897154 kernel: audit: type=1400 audit(1734061719.685:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.958891 kernel: audit: type=1400 audit(1734061719.685:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.020657 kernel: audit: type=1400 audit(1734061719.685:667): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.082388 kernel: audit: type=1400 audit(1734061719.685:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.144105 kernel: audit: type=1400 audit(1734061719.685:669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.205843 kernel: audit: type=1400 audit(1734061719.685:670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.267174 kernel: audit: type=1400 audit(1734061719.834:671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit: BPF prog-id=108 op=LOAD Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3298 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:39.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643534333538303964636534333437633939656233633231356132 Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3298 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:39.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643534333538303964636534333437633939656233633231356132 Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.834000 audit: BPF prog-id=109 op=LOAD Dec 13 03:48:39.834000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00024ddf0 items=0 ppid=3298 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:39.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643534333538303964636534333437633939656233633231356132 Dec 13 03:48:39.957000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.957000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.957000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.957000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.957000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.957000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.957000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.957000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.957000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:39.957000 audit: BPF prog-id=110 op=LOAD Dec 13 03:48:39.957000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00024de38 items=0 ppid=3298 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:39.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643534333538303964636534333437633939656233633231356132 Dec 13 03:48:40.080000 audit: BPF prog-id=110 op=UNLOAD Dec 13 03:48:40.080000 audit: BPF prog-id=109 op=UNLOAD Dec 13 03:48:40.081000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.081000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.081000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.081000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.081000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.081000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.081000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.081000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.081000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.081000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:40.081000 audit: BPF prog-id=111 op=LOAD Dec 13 03:48:40.081000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00039e248 items=0 ppid=3298 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:40.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643534333538303964636534333437633939656233633231356132 Dec 13 03:48:40.334918 env[1556]: time="2024-12-13T03:48:40.334898254Z" level=info msg="StartContainer for \"78d5435809dce4347c99eb3c215a242906d17e084abe14bc224e9be3b6f840b3\" returns successfully" Dec 13 03:48:40.637585 kubelet[1913]: E1213 03:48:40.637469 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:40.858302 kubelet[1913]: I1213 03:48:40.858194 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-qxb7k" podStartSLOduration=16.207956674 podStartE2EDuration="19.85810531s" podCreationTimestamp="2024-12-13 03:48:21 +0000 UTC" firstStartedPulling="2024-12-13 03:48:36.014375168 +0000 UTC m=+32.731012526" lastFinishedPulling="2024-12-13 03:48:39.664523805 +0000 UTC m=+36.381161162" observedRunningTime="2024-12-13 03:48:40.857539092 +0000 UTC m=+37.574176518" watchObservedRunningTime="2024-12-13 03:48:40.85810531 +0000 UTC m=+37.574742721" Dec 13 03:48:41.638756 kubelet[1913]: E1213 03:48:41.638644 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:42.639558 kubelet[1913]: E1213 03:48:42.639453 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:43.611624 kubelet[1913]: E1213 03:48:43.611519 1913 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:43.640758 kubelet[1913]: E1213 03:48:43.640635 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:44.103000 audit[3414]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=3414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:44.103000 audit[3414]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe76f505e0 a2=0 a3=7ffe76f505cc items=0 ppid=2075 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:44.111164 kubelet[1913]: I1213 03:48:44.111120 1913 topology_manager.go:215] "Topology Admit Handler" podUID="c9158040-98fd-4d5f-aaec-75754b0275c0" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 03:48:44.114404 systemd[1]: Created slice kubepods-besteffort-podc9158040_98fd_4d5f_aaec_75754b0275c0.slice. Dec 13 03:48:44.115000 audit[3414]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=3414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:44.115000 audit[3414]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe76f505e0 a2=0 a3=0 items=0 ppid=2075 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:44.129000 audit[3418]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=3418 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:44.129000 audit[3418]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd96c9d6e0 a2=0 a3=7ffd96c9d6cc items=0 ppid=2075 pid=3418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:44.144000 audit[3418]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=3418 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:44.144000 audit[3418]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd96c9d6e0 a2=0 a3=0 items=0 ppid=2075 pid=3418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:44.212934 kubelet[1913]: I1213 03:48:44.212825 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pjhdh\" (UniqueName: \"kubernetes.io/projected/c9158040-98fd-4d5f-aaec-75754b0275c0-kube-api-access-pjhdh\") pod \"nfs-server-provisioner-0\" (UID: \"c9158040-98fd-4d5f-aaec-75754b0275c0\") " pod="default/nfs-server-provisioner-0" Dec 13 03:48:44.213211 kubelet[1913]: I1213 03:48:44.213065 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/c9158040-98fd-4d5f-aaec-75754b0275c0-data\") pod \"nfs-server-provisioner-0\" (UID: \"c9158040-98fd-4d5f-aaec-75754b0275c0\") " pod="default/nfs-server-provisioner-0" Dec 13 03:48:44.418014 env[1556]: time="2024-12-13T03:48:44.417761980Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c9158040-98fd-4d5f-aaec-75754b0275c0,Namespace:default,Attempt:0,}" Dec 13 03:48:44.561513 systemd-networkd[1308]: cali60e51b789ff: Link UP Dec 13 03:48:44.629689 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:48:44.629724 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 03:48:44.629769 systemd-networkd[1308]: cali60e51b789ff: Gained carrier Dec 13 03:48:44.640827 kubelet[1913]: E1213 03:48:44.640785 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.460 [INFO][3421] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.37-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default c9158040-98fd-4d5f-aaec-75754b0275c0 1751 0 2024-12-13 03:48:44 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.80.37 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.460 [INFO][3421] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.521 [INFO][3442] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" HandleID="k8s-pod-network.a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" Workload="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.529 [INFO][3442] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" HandleID="k8s-pod-network.a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" Workload="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000288190), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.37", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 03:48:44.521228652 +0000 UTC"}, Hostname:"10.67.80.37", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.529 [INFO][3442] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.529 [INFO][3442] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.529 [INFO][3442] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.37' Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.530 [INFO][3442] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" host="10.67.80.37" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.536 [INFO][3442] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.37" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.540 [INFO][3442] ipam/ipam.go 489: Trying affinity for 192.168.81.0/26 host="10.67.80.37" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.542 [INFO][3442] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.0/26 host="10.67.80.37" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.544 [INFO][3442] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.0/26 host="10.67.80.37" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.544 [INFO][3442] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.0/26 handle="k8s-pod-network.a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" host="10.67.80.37" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.545 [INFO][3442] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99 Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.549 [INFO][3442] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.0/26 handle="k8s-pod-network.a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" host="10.67.80.37" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.554 [INFO][3442] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.3/26] block=192.168.81.0/26 handle="k8s-pod-network.a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" host="10.67.80.37" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.554 [INFO][3442] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.3/26] handle="k8s-pod-network.a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" host="10.67.80.37" Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.554 [INFO][3442] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:48:44.648089 env[1556]: 2024-12-13 03:48:44.554 [INFO][3442] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.3/26] IPv6=[] ContainerID="a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" HandleID="k8s-pod-network.a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" Workload="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:48:44.650476 env[1556]: 2024-12-13 03:48:44.557 [INFO][3421] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c9158040-98fd-4d5f-aaec-75754b0275c0", ResourceVersion:"1751", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.81.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:48:44.650476 env[1556]: 2024-12-13 03:48:44.558 [INFO][3421] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.3/32] ContainerID="a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:48:44.650476 env[1556]: 2024-12-13 03:48:44.558 [INFO][3421] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:48:44.650476 env[1556]: 2024-12-13 03:48:44.629 [INFO][3421] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:48:44.651255 env[1556]: 2024-12-13 03:48:44.629 [INFO][3421] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c9158040-98fd-4d5f-aaec-75754b0275c0", ResourceVersion:"1751", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.81.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"be:38:23:f0:ae:9e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:48:44.651255 env[1556]: 2024-12-13 03:48:44.644 [INFO][3421] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:48:44.674394 env[1556]: time="2024-12-13T03:48:44.674082233Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:48:44.674394 env[1556]: time="2024-12-13T03:48:44.674179204Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:48:44.674394 env[1556]: time="2024-12-13T03:48:44.674223178Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:48:44.675050 env[1556]: time="2024-12-13T03:48:44.674678447Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99 pid=3481 runtime=io.containerd.runc.v2 Dec 13 03:48:44.675000 audit[3482]: NETFILTER_CFG table=filter:75 family=2 entries=44 op=nft_register_chain pid=3482 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:48:44.675000 audit[3482]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffd3fa7d790 a2=0 a3=7ffd3fa7d77c items=0 ppid=2664 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.675000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:48:44.700320 systemd[1]: Started cri-containerd-a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99.scope. Dec 13 03:48:44.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.740361 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 03:48:44.740417 kernel: audit: type=1400 audit(1734061724.711:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.802344 kernel: audit: type=1400 audit(1734061724.711:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.864405 kernel: audit: type=1400 audit(1734061724.711:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.987746 kernel: audit: type=1400 audit(1734061724.711:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.987807 kernel: audit: type=1400 audit(1734061724.711:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.050780 kernel: audit: type=1400 audit(1734061724.711:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.113108 kernel: audit: type=1400 audit(1734061724.711:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.175938 kernel: audit: type=1400 audit(1734061724.711:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.238035 kernel: audit: type=1400 audit(1734061724.711:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.299775 kernel: audit: type=1400 audit(1734061724.800:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.800000 audit: BPF prog-id=112 op=LOAD Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3481 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353032333463363431343465333037663462383462613763633436 Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3481 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353032333463363431343465333037663462383462613763633436 Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.801000 audit: BPF prog-id=113 op=LOAD Dec 13 03:48:44.801000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000382780 items=0 ppid=3481 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353032333463363431343465333037663462383462613763633436 Dec 13 03:48:44.924000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.924000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.924000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.924000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.924000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.924000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.924000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.924000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.924000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:44.924000 audit: BPF prog-id=114 op=LOAD Dec 13 03:48:44.924000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003827c8 items=0 ppid=3481 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353032333463363431343465333037663462383462613763633436 Dec 13 03:48:45.049000 audit: BPF prog-id=114 op=UNLOAD Dec 13 03:48:45.049000 audit: BPF prog-id=113 op=UNLOAD Dec 13 03:48:45.049000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.049000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.049000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.049000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.049000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.049000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.049000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.049000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.049000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.049000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:45.049000 audit: BPF prog-id=115 op=LOAD Dec 13 03:48:45.049000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000382bd8 items=0 ppid=3481 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:45.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353032333463363431343465333037663462383462613763633436 Dec 13 03:48:45.377543 env[1556]: time="2024-12-13T03:48:45.377483591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c9158040-98fd-4d5f-aaec-75754b0275c0,Namespace:default,Attempt:0,} returns sandbox id \"a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99\"" Dec 13 03:48:45.378580 env[1556]: time="2024-12-13T03:48:45.378556551Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 03:48:45.642015 kubelet[1913]: E1213 03:48:45.641898 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:46.185447 systemd-networkd[1308]: cali60e51b789ff: Gained IPv6LL Dec 13 03:48:46.642583 kubelet[1913]: E1213 03:48:46.642466 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:47.507571 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount442950113.mount: Deactivated successfully. Dec 13 03:48:47.643350 kubelet[1913]: E1213 03:48:47.643297 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:48.644349 kubelet[1913]: E1213 03:48:48.644288 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:48.675232 env[1556]: time="2024-12-13T03:48:48.675182485Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:48.675948 env[1556]: time="2024-12-13T03:48:48.675903508Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:48.677148 env[1556]: time="2024-12-13T03:48:48.677107863Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:48.677943 env[1556]: time="2024-12-13T03:48:48.677897021Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:48:48.678834 env[1556]: time="2024-12-13T03:48:48.678800134Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 03:48:48.679792 env[1556]: time="2024-12-13T03:48:48.679752030Z" level=info msg="CreateContainer within sandbox \"a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 03:48:48.684575 env[1556]: time="2024-12-13T03:48:48.684537165Z" level=info msg="CreateContainer within sandbox \"a450234c64144e307f4b84ba7cc46438fa6bd9249b5bce752fc708e41f49ac99\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"e7eb584d4f9141bd5a3447d7fbd6cc881ae7b15a4e1b0dcf83d69d55b445c43f\"" Dec 13 03:48:48.684787 env[1556]: time="2024-12-13T03:48:48.684748165Z" level=info msg="StartContainer for \"e7eb584d4f9141bd5a3447d7fbd6cc881ae7b15a4e1b0dcf83d69d55b445c43f\"" Dec 13 03:48:48.696281 systemd[1]: Started cri-containerd-e7eb584d4f9141bd5a3447d7fbd6cc881ae7b15a4e1b0dcf83d69d55b445c43f.scope. Dec 13 03:48:48.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit: BPF prog-id=116 op=LOAD Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3481 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:48.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656235383464346639313431626435613334343764376662643663 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3481 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:48.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656235383464346639313431626435613334343764376662643663 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit: BPF prog-id=117 op=LOAD Dec 13 03:48:48.700000 audit[3527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d60d0 items=0 ppid=3481 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:48.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656235383464346639313431626435613334343764376662643663 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit: BPF prog-id=118 op=LOAD Dec 13 03:48:48.700000 audit[3527]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d6118 items=0 ppid=3481 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:48.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656235383464346639313431626435613334343764376662643663 Dec 13 03:48:48.700000 audit: BPF prog-id=118 op=UNLOAD Dec 13 03:48:48.700000 audit: BPF prog-id=117 op=UNLOAD Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { perfmon } for pid=3527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit[3527]: AVC avc: denied { bpf } for pid=3527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:48:48.700000 audit: BPF prog-id=119 op=LOAD Dec 13 03:48:48.700000 audit[3527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d6528 items=0 ppid=3481 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:48.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656235383464346639313431626435613334343764376662643663 Dec 13 03:48:48.707388 env[1556]: time="2024-12-13T03:48:48.707348518Z" level=info msg="StartContainer for \"e7eb584d4f9141bd5a3447d7fbd6cc881ae7b15a4e1b0dcf83d69d55b445c43f\" returns successfully" Dec 13 03:48:48.732000 audit[3556]: AVC avc: denied { search } for pid=3556 comm="rpcbind" name="crypto" dev="proc" ino=13932 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c773 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 03:48:48.732000 audit[3556]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f811988b0c0 a2=0 a3=0 items=0 ppid=3538 pid=3556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c773 key=(null) Dec 13 03:48:48.732000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 03:48:48.751000 audit[3561]: AVC avc: denied { search } for pid=3561 comm="dbus-daemon" name="crypto" dev="proc" ino=13932 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c773 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 03:48:48.751000 audit[3561]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f9d0bed10c0 a2=0 a3=0 items=0 ppid=3538 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c773 key=(null) Dec 13 03:48:48.751000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 03:48:48.753000 audit[3562]: AVC avc: denied { watch } for pid=3562 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=534597 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c773 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c378,c773 tclass=dir permissive=0 Dec 13 03:48:48.753000 audit[3562]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55d38de4f940 a2=2c8 a3=7ffe9e494cec items=0 ppid=3538 pid=3562 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c773 key=(null) Dec 13 03:48:48.753000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 03:48:48.754000 audit[3563]: AVC avc: denied { read } for pid=3563 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=34964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c773 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 03:48:48.754000 audit[3563]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f0e0447f320 a1=80000 a2=d a3=7ffc308b99e0 items=0 ppid=3538 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c773 key=(null) Dec 13 03:48:48.754000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 03:48:48.755000 audit[3563]: AVC avc: denied { search } for pid=3563 comm="ganesha.nfsd" name="crypto" dev="proc" ino=13932 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c773 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 03:48:48.755000 audit[3563]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f0e039d30c0 a2=0 a3=0 items=0 ppid=3538 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c773 key=(null) Dec 13 03:48:48.755000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 03:48:48.891649 kubelet[1913]: I1213 03:48:48.891541 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.59076131 podStartE2EDuration="4.89145594s" podCreationTimestamp="2024-12-13 03:48:44 +0000 UTC" firstStartedPulling="2024-12-13 03:48:45.378196017 +0000 UTC m=+42.094833375" lastFinishedPulling="2024-12-13 03:48:48.678890648 +0000 UTC m=+45.395528005" observedRunningTime="2024-12-13 03:48:48.891260183 +0000 UTC m=+45.607897600" watchObservedRunningTime="2024-12-13 03:48:48.89145594 +0000 UTC m=+45.608093346" Dec 13 03:48:48.906000 audit[3581]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:48.906000 audit[3581]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffded3d6d10 a2=0 a3=7ffded3d6cfc items=0 ppid=2075 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:48.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:48.917000 audit[3581]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:48.917000 audit[3581]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffded3d6d10 a2=0 a3=7ffded3d6cfc items=0 ppid=2075 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:48.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:49.645235 kubelet[1913]: E1213 03:48:49.645120 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:50.645782 kubelet[1913]: E1213 03:48:50.645678 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:51.646775 kubelet[1913]: E1213 03:48:51.646632 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:52.647970 kubelet[1913]: E1213 03:48:52.647856 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:53.648901 kubelet[1913]: E1213 03:48:53.648788 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:54.649183 kubelet[1913]: E1213 03:48:54.649057 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:55.650431 kubelet[1913]: E1213 03:48:55.650305 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:56.650770 kubelet[1913]: E1213 03:48:56.650645 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:57.651442 kubelet[1913]: E1213 03:48:57.651360 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:58.209277 kubelet[1913]: I1213 03:48:58.209175 1913 topology_manager.go:215] "Topology Admit Handler" podUID="4e53b4c3-6e48-4dc0-b945-e777c6cc71c6" podNamespace="default" podName="test-pod-1" Dec 13 03:48:58.223190 systemd[1]: Created slice kubepods-besteffort-pod4e53b4c3_6e48_4dc0_b945_e777c6cc71c6.slice. Dec 13 03:48:58.318326 kubelet[1913]: I1213 03:48:58.318204 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fhqt8\" (UniqueName: \"kubernetes.io/projected/4e53b4c3-6e48-4dc0-b945-e777c6cc71c6-kube-api-access-fhqt8\") pod \"test-pod-1\" (UID: \"4e53b4c3-6e48-4dc0-b945-e777c6cc71c6\") " pod="default/test-pod-1" Dec 13 03:48:58.318326 kubelet[1913]: I1213 03:48:58.318327 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-3221f25f-0dbe-4f87-832d-b75baf126338\" (UniqueName: \"kubernetes.io/nfs/4e53b4c3-6e48-4dc0-b945-e777c6cc71c6-pvc-3221f25f-0dbe-4f87-832d-b75baf126338\") pod \"test-pod-1\" (UID: \"4e53b4c3-6e48-4dc0-b945-e777c6cc71c6\") " pod="default/test-pod-1" Dec 13 03:48:58.430000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.457194 kernel: Failed to create system directory netfs Dec 13 03:48:58.457275 kernel: kauditd_printk_skb: 125 callbacks suppressed Dec 13 03:48:58.457291 kernel: audit: type=1400 audit(1734061738.430:728): avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.457307 kernel: Failed to create system directory netfs Dec 13 03:48:58.457342 kernel: Failed to create system directory netfs Dec 13 03:48:58.483344 kernel: audit: type=1400 audit(1734061738.430:728): avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.430000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.595890 kernel: Failed to create system directory netfs Dec 13 03:48:58.595914 kernel: audit: type=1400 audit(1734061738.430:728): avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.430000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.651604 kubelet[1913]: E1213 03:48:58.651559 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:58.430000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.892254 kernel: audit: type=1400 audit(1734061738.430:728): avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.430000 audit[3603]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bad2745e0 a1=153bc a2=557ba83582b0 a3=5 items=0 ppid=283 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:58.430000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:48:59.013730 kernel: audit: type=1300 audit(1734061738.430:728): arch=c000003e syscall=175 success=yes exit=0 a0=557bad2745e0 a1=153bc a2=557ba83582b0 a3=5 items=0 ppid=283 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:59.013759 kernel: audit: type=1327 audit(1734061738.430:728): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.038526 kernel: Failed to create system directory fscache Dec 13 03:48:59.038554 kernel: audit: type=1400 audit(1734061738.903:729): avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.038570 kernel: Failed to create system directory fscache Dec 13 03:48:59.120037 kernel: audit: type=1400 audit(1734061738.903:729): avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.144605 kernel: Failed to create system directory fscache Dec 13 03:48:59.226965 kernel: audit: type=1400 audit(1734061738.903:729): avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.251480 kernel: Failed to create system directory fscache Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.357251 kernel: audit: type=1400 audit(1734061738.903:729): avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.357298 kernel: Failed to create system directory fscache Dec 13 03:48:59.357313 kernel: Failed to create system directory fscache Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.509536 kernel: Failed to create system directory fscache Dec 13 03:48:59.509619 kernel: Failed to create system directory fscache Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.532052 kernel: Failed to create system directory fscache Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.554187 kernel: Failed to create system directory fscache Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.575840 kernel: Failed to create system directory fscache Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.597066 kernel: Failed to create system directory fscache Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.617858 kernel: Failed to create system directory fscache Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.638307 kernel: Failed to create system directory fscache Dec 13 03:48:58.903000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.652707 kubelet[1913]: E1213 03:48:59.652668 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:48:58.903000 audit[3603]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bad4899c0 a1=4c0fc a2=557ba83582b0 a3=5 items=0 ppid=283 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:58.903000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:48:59.678396 kernel: FS-Cache: Loaded Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.738238 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.738267 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.738303 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.757274 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.775723 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.794003 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.812389 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.830276 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.847804 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.864741 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.881542 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.897948 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.913980 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.929520 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.944678 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.959423 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.973652 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.000947 kernel: Failed to create system directory sunrpc Dec 13 03:49:00.001028 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.014043 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.026614 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.038812 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.050595 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.061950 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.072902 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.083708 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.094126 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.104105 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.113646 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.123084 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.132137 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.140682 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.148787 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.156715 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.164243 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.171345 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.178000 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.184504 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.191007 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.197511 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.204011 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.210504 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.216997 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.223478 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.229988 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.236465 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.242963 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.249314 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.255548 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.261762 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.267952 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.274199 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.280424 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.286644 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.292853 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.299052 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.305274 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.311484 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.317680 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.323879 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.330103 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.336282 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.342473 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.348680 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.354863 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.361055 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.367218 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.373411 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.379584 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.385759 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.391964 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.398131 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.404330 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.410506 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.416707 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.422926 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.429104 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.435311 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.441529 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.447721 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.453982 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.460202 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.466428 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.472723 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.478911 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.485114 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.491334 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.497560 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.503752 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.509955 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.516124 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.522363 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.528543 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.534782 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.540991 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.547189 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.553421 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.559644 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.565856 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.572047 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.578251 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.584507 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.590747 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.596921 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.603138 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.609348 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.615554 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.621777 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.628010 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.634256 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.640502 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.646784 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.653024 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.653107 kubelet[1913]: E1213 03:49:00.653047 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:49:00.659263 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.665511 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.671771 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.678019 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.684239 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.690441 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.696651 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.702875 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.709059 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.715280 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.721449 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.727673 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.733876 kernel: Failed to create system directory sunrpc Dec 13 03:48:59.692000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.759580 kernel: RPC: Registered named UNIX socket transport module. Dec 13 03:49:00.759614 kernel: RPC: Registered udp transport module. Dec 13 03:49:00.759632 kernel: RPC: Registered tcp transport module. Dec 13 03:49:00.765819 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 03:48:59.692000 audit[3603]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bad4d5ad0 a1=1a7f1c a2=557ba83582b0 a3=5 items=6 ppid=283 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:59.692000 audit: CWD cwd="/" Dec 13 03:48:59.692000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:59.692000 audit: PATH item=1 name=(null) inode=33297 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:59.692000 audit: PATH item=2 name=(null) inode=33297 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:59.692000 audit: PATH item=3 name=(null) inode=33298 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:59.692000 audit: PATH item=4 name=(null) inode=33297 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:59.692000 audit: PATH item=5 name=(null) inode=33299 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:48:59.692000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.813955 kernel: Failed to create system directory nfs Dec 13 03:49:00.813986 kernel: Failed to create system directory nfs Dec 13 03:49:00.814004 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.820544 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.827133 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.833723 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.840317 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.846919 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.853506 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.860094 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.866686 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.873271 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.879862 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.886462 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.893041 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.899631 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.906293 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.912897 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.919467 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.926069 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.932680 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.939265 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.945874 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.952459 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.959067 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.965659 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.972237 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.978838 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.985385 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.992000 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:00.998600 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.005189 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.011770 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.018378 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.024925 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.031512 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.038106 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.044713 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.051290 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.057861 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.064462 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.071079 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.077673 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.084264 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.090695 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.096967 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.103251 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.109417 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.115317 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.121270 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.127184 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.133138 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.139046 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.144989 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.150891 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.156810 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.162739 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.168690 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.174604 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.180521 kernel: Failed to create system directory nfs Dec 13 03:49:00.793000 audit[3603]: AVC avc: denied { confidentiality } for pid=3603 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.206357 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 03:49:00.793000 audit[3603]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bad6f6700 a1=16e97c a2=557ba83582b0 a3=5 items=0 ppid=283 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:00.793000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.245811 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.245871 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.245906 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.252157 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.258499 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.264825 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.271147 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.283882 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.283911 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.296575 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.296640 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.302890 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.309201 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.315533 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.321866 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.328190 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.334494 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.340841 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.347154 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.353524 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.359845 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.366154 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.372492 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.378843 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.385172 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.391517 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.397853 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.404180 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.410515 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.416846 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.423199 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.429519 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.435913 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.442229 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.448596 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.454958 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.461296 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.467636 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.474013 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.480369 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.486697 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.493078 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.499398 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.505768 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.512141 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.518478 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.524848 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.537175 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.537232 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.543244 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.549288 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.555392 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.561420 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.567483 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.573544 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.579581 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.585635 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.591694 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.597737 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.603791 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.615901 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.615982 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.621920 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.627957 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.634005 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.640009 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.646062 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.652060 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.653168 kubelet[1913]: E1213 03:49:01.653126 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:49:01.658102 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.664114 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.670142 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.676137 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.682168 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.688160 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.694131 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.700149 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.706116 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.712104 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.718070 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.724065 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.730096 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.736089 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.742101 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.748033 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.753978 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.759952 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.765916 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.771906 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.777856 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.783777 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.789768 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.795729 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.801690 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.807604 kernel: Failed to create system directory nfs4 Dec 13 03:49:01.224000 audit[3609]: AVC avc: denied { confidentiality } for pid=3609 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.916132 kernel: NFS: Registering the id_resolver key type Dec 13 03:49:01.916164 kernel: Key type id_resolver registered Dec 13 03:49:01.916179 kernel: Key type id_legacy registered Dec 13 03:49:01.224000 audit[3609]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7c9290a010 a1=208de4 a2=564f4f1fd2b0 a3=5 items=0 ppid=283 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:01.224000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.943429 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.943474 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.943487 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.950003 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.956680 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.963298 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.969907 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.976555 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.983184 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.989836 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.996440 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.003124 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.009780 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.016429 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.023028 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.029676 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.036335 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.042981 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.049626 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.062918 kernel: Failed to create system directory rpcgss Dec 13 03:49:02.062943 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.069577 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.076245 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.082932 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.089605 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:02.096286 kernel: Failed to create system directory rpcgss Dec 13 03:49:01.926000 audit[3610]: AVC avc: denied { confidentiality } for pid=3610 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:49:01.926000 audit[3610]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f5448500010 a1=70af4 a2=560212d342b0 a3=5 items=0 ppid=283 pid=3610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:01.926000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 03:49:02.130141 nfsidmap[3619]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-bb67cfe667' Dec 13 03:49:02.140132 nfsidmap[3620]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-bb67cfe667' Dec 13 03:49:02.151000 audit[1640]: AVC avc: denied { watch_reads } for pid=1640 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3130 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:49:02.151000 audit[1640]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ded074cb90 a2=10 a3=468730ec42886fbd items=0 ppid=1 pid=1640 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:02.151000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 03:49:02.151000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3130 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:49:02.151000 audit[1640]: AVC avc: denied { watch_reads } for pid=1640 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3130 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:49:02.151000 audit[1640]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ded074cb90 a2=10 a3=468730ec42886fbd items=0 ppid=1 pid=1640 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:02.151000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 03:49:02.151000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3130 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:49:02.151000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3130 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:49:02.151000 audit[1640]: AVC avc: denied { watch_reads } for pid=1640 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3130 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:49:02.151000 audit[1640]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ded074cb90 a2=10 a3=468730ec42886fbd items=0 ppid=1 pid=1640 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:02.151000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 03:49:02.429703 env[1556]: time="2024-12-13T03:49:02.429582355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4e53b4c3-6e48-4dc0-b945-e777c6cc71c6,Namespace:default,Attempt:0,}" Dec 13 03:49:02.579461 systemd-networkd[1308]: cali5ec59c6bf6e: Link UP Dec 13 03:49:02.597385 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:49:02.597421 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 03:49:02.597435 systemd-networkd[1308]: cali5ec59c6bf6e: Gained carrier Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.475 [INFO][3622] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.37-k8s-test--pod--1-eth0 default 4e53b4c3-6e48-4dc0-b945-e777c6cc71c6 1809 0 2024-12-13 03:48:44 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.37 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.475 [INFO][3622] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.506 [INFO][3642] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" HandleID="k8s-pod-network.e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" Workload="10.67.80.37-k8s-test--pod--1-eth0" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.523 [INFO][3642] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" HandleID="k8s-pod-network.e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" Workload="10.67.80.37-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003cbcf0), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.37", "pod":"test-pod-1", "timestamp":"2024-12-13 03:49:02.506959614 +0000 UTC"}, Hostname:"10.67.80.37", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.523 [INFO][3642] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.523 [INFO][3642] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.523 [INFO][3642] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.37' Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.526 [INFO][3642] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" host="10.67.80.37" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.533 [INFO][3642] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.37" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.541 [INFO][3642] ipam/ipam.go 489: Trying affinity for 192.168.81.0/26 host="10.67.80.37" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.545 [INFO][3642] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.0/26 host="10.67.80.37" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.550 [INFO][3642] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.0/26 host="10.67.80.37" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.550 [INFO][3642] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.0/26 handle="k8s-pod-network.e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" host="10.67.80.37" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.555 [INFO][3642] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.562 [INFO][3642] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.0/26 handle="k8s-pod-network.e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" host="10.67.80.37" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.572 [INFO][3642] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.4/26] block=192.168.81.0/26 handle="k8s-pod-network.e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" host="10.67.80.37" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.572 [INFO][3642] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.4/26] handle="k8s-pod-network.e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" host="10.67.80.37" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.573 [INFO][3642] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.573 [INFO][3642] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.4/26] IPv6=[] ContainerID="e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" HandleID="k8s-pod-network.e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" Workload="10.67.80.37-k8s-test--pod--1-eth0" Dec 13 03:49:02.607394 env[1556]: 2024-12-13 03:49:02.576 [INFO][3622] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4e53b4c3-6e48-4dc0-b945-e777c6cc71c6", ResourceVersion:"1809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:49:02.609646 env[1556]: 2024-12-13 03:49:02.576 [INFO][3622] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.4/32] ContainerID="e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" Dec 13 03:49:02.609646 env[1556]: 2024-12-13 03:49:02.576 [INFO][3622] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" Dec 13 03:49:02.609646 env[1556]: 2024-12-13 03:49:02.597 [INFO][3622] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" Dec 13 03:49:02.609646 env[1556]: 2024-12-13 03:49:02.597 [INFO][3622] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4e53b4c3-6e48-4dc0-b945-e777c6cc71c6", ResourceVersion:"1809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"da:13:a6:ea:0f:82", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:49:02.609646 env[1556]: 2024-12-13 03:49:02.604 [INFO][3622] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" Dec 13 03:49:02.615987 env[1556]: time="2024-12-13T03:49:02.615937650Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:49:02.615987 env[1556]: time="2024-12-13T03:49:02.615957882Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:49:02.615987 env[1556]: time="2024-12-13T03:49:02.615978062Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:49:02.616159 env[1556]: time="2024-12-13T03:49:02.616087005Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae pid=3675 runtime=io.containerd.runc.v2 Dec 13 03:49:02.614000 audit[3676]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_chain pid=3676 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:49:02.614000 audit[3676]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7fff94925c70 a2=0 a3=7fff94925c5c items=0 ppid=2664 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:02.614000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:49:02.622117 systemd[1]: Started cri-containerd-e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae.scope. Dec 13 03:49:02.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.626000 audit: BPF prog-id=120 op=LOAD Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3675 pid=3686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:02.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534386365323131643933336561653331303237636164616532653335 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3675 pid=3686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:02.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534386365323131643933336561653331303237636164616532653335 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit: BPF prog-id=121 op=LOAD Dec 13 03:49:02.627000 audit[3686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f1d90 items=0 ppid=3675 pid=3686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:02.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534386365323131643933336561653331303237636164616532653335 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit: BPF prog-id=122 op=LOAD Dec 13 03:49:02.627000 audit[3686]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f1dd8 items=0 ppid=3675 pid=3686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:02.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534386365323131643933336561653331303237636164616532653335 Dec 13 03:49:02.627000 audit: BPF prog-id=122 op=UNLOAD Dec 13 03:49:02.627000 audit: BPF prog-id=121 op=UNLOAD Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { perfmon } for pid=3686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit[3686]: AVC avc: denied { bpf } for pid=3686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:02.627000 audit: BPF prog-id=123 op=LOAD Dec 13 03:49:02.627000 audit[3686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e61e8 items=0 ppid=3675 pid=3686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:02.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534386365323131643933336561653331303237636164616532653335 Dec 13 03:49:02.646642 env[1556]: time="2024-12-13T03:49:02.646587803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4e53b4c3-6e48-4dc0-b945-e777c6cc71c6,Namespace:default,Attempt:0,} returns sandbox id \"e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae\"" Dec 13 03:49:02.647272 env[1556]: time="2024-12-13T03:49:02.647256758Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 03:49:02.653490 kubelet[1913]: E1213 03:49:02.653446 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:49:03.011488 env[1556]: time="2024-12-13T03:49:03.011395431Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:49:03.013871 env[1556]: time="2024-12-13T03:49:03.013804985Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:49:03.018552 env[1556]: time="2024-12-13T03:49:03.018482918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:49:03.023233 env[1556]: time="2024-12-13T03:49:03.023169314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:49:03.025551 env[1556]: time="2024-12-13T03:49:03.025435858Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 03:49:03.029322 env[1556]: time="2024-12-13T03:49:03.029219063Z" level=info msg="CreateContainer within sandbox \"e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 03:49:03.044644 env[1556]: time="2024-12-13T03:49:03.044502059Z" level=info msg="CreateContainer within sandbox \"e48ce211d933eae31027cadae2e359ab39bd7ef498e6bc9dff8b11b42980d3ae\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"d96f70499d37382318f195cf734af66ecbd4426b8bb6a7baeec491b4b66ee25e\"" Dec 13 03:49:03.045636 env[1556]: time="2024-12-13T03:49:03.045513465Z" level=info msg="StartContainer for \"d96f70499d37382318f195cf734af66ecbd4426b8bb6a7baeec491b4b66ee25e\"" Dec 13 03:49:03.060051 systemd[1]: Started cri-containerd-d96f70499d37382318f195cf734af66ecbd4426b8bb6a7baeec491b4b66ee25e.scope. Dec 13 03:49:03.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit: BPF prog-id=124 op=LOAD Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3675 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:03.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366637303439396433373338323331386631393563663733346166 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3675 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:03.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366637303439396433373338323331386631393563663733346166 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit: BPF prog-id=125 op=LOAD Dec 13 03:49:03.065000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000255d10 items=0 ppid=3675 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:03.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366637303439396433373338323331386631393563663733346166 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit: BPF prog-id=126 op=LOAD Dec 13 03:49:03.065000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000255d58 items=0 ppid=3675 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:03.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366637303439396433373338323331386631393563663733346166 Dec 13 03:49:03.065000 audit: BPF prog-id=126 op=UNLOAD Dec 13 03:49:03.065000 audit: BPF prog-id=125 op=UNLOAD Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:49:03.065000 audit: BPF prog-id=127 op=LOAD Dec 13 03:49:03.065000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003c0168 items=0 ppid=3675 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:03.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366637303439396433373338323331386631393563663733346166 Dec 13 03:49:03.072370 env[1556]: time="2024-12-13T03:49:03.072348920Z" level=info msg="StartContainer for \"d96f70499d37382318f195cf734af66ecbd4426b8bb6a7baeec491b4b66ee25e\" returns successfully" Dec 13 03:49:03.611582 kubelet[1913]: E1213 03:49:03.611452 1913 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:49:03.628988 env[1556]: time="2024-12-13T03:49:03.628881656Z" level=info msg="StopPodSandbox for \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\"" Dec 13 03:49:03.653782 kubelet[1913]: E1213 03:49:03.653713 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.668 [WARNING][3793] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-csi--node--driver--jtb5l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"794697ba-55b5-4875-b715-3d8e07467cfc", ResourceVersion:"1707", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b", Pod:"csi-node-driver-jtb5l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali30f836e0b9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.669 [INFO][3793] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.669 [INFO][3793] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" iface="eth0" netns="" Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.669 [INFO][3793] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.669 [INFO][3793] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.683 [INFO][3806] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" HandleID="k8s-pod-network.70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.683 [INFO][3806] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.683 [INFO][3806] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.695 [WARNING][3806] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" HandleID="k8s-pod-network.70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.695 [INFO][3806] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" HandleID="k8s-pod-network.70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.698 [INFO][3806] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:49:03.700191 env[1556]: 2024-12-13 03:49:03.699 [INFO][3793] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:49:03.700191 env[1556]: time="2024-12-13T03:49:03.700170940Z" level=info msg="TearDown network for sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\" successfully" Dec 13 03:49:03.700191 env[1556]: time="2024-12-13T03:49:03.700190418Z" level=info msg="StopPodSandbox for \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\" returns successfully" Dec 13 03:49:03.700614 env[1556]: time="2024-12-13T03:49:03.700550224Z" level=info msg="RemovePodSandbox for \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\"" Dec 13 03:49:03.700614 env[1556]: time="2024-12-13T03:49:03.700570550Z" level=info msg="Forcibly stopping sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\"" Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.733 [WARNING][3835] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-csi--node--driver--jtb5l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"794697ba-55b5-4875-b715-3d8e07467cfc", ResourceVersion:"1707", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"5b31b8d0cd9b779aebab75717994ee38d293e53f8aba9c321baa86f484451f4b", Pod:"csi-node-driver-jtb5l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali30f836e0b9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.733 [INFO][3835] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.733 [INFO][3835] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" iface="eth0" netns="" Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.733 [INFO][3835] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.733 [INFO][3835] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.754 [INFO][3850] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" HandleID="k8s-pod-network.70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.754 [INFO][3850] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.754 [INFO][3850] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.767 [WARNING][3850] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" HandleID="k8s-pod-network.70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.767 [INFO][3850] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" HandleID="k8s-pod-network.70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Workload="10.67.80.37-k8s-csi--node--driver--jtb5l-eth0" Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.771 [INFO][3850] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:49:03.776019 env[1556]: 2024-12-13 03:49:03.773 [INFO][3835] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5" Dec 13 03:49:03.777472 env[1556]: time="2024-12-13T03:49:03.776026830Z" level=info msg="TearDown network for sandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\" successfully" Dec 13 03:49:03.780669 env[1556]: time="2024-12-13T03:49:03.780570810Z" level=info msg="RemovePodSandbox \"70afbb597d3bbe82d8a560780dcfec67eb51cf39a1e3cfefeb6b5e527d392ee5\" returns successfully" Dec 13 03:49:03.781565 env[1556]: time="2024-12-13T03:49:03.781471507Z" level=info msg="StopPodSandbox for \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\"" Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.827 [WARNING][3881] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5dbc7550-83db-45de-92ae-7e7a04b241bc", ResourceVersion:"1723", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5", Pod:"nginx-deployment-6d5f899847-qxb7k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3521822769b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.827 [INFO][3881] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.827 [INFO][3881] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" iface="eth0" netns="" Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.827 [INFO][3881] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.827 [INFO][3881] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.875 [INFO][3892] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" HandleID="k8s-pod-network.ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.875 [INFO][3892] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.875 [INFO][3892] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.886 [WARNING][3892] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" HandleID="k8s-pod-network.ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.887 [INFO][3892] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" HandleID="k8s-pod-network.ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.889 [INFO][3892] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:49:03.894707 env[1556]: 2024-12-13 03:49:03.892 [INFO][3881] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:49:03.894707 env[1556]: time="2024-12-13T03:49:03.894601609Z" level=info msg="TearDown network for sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\" successfully" Dec 13 03:49:03.894707 env[1556]: time="2024-12-13T03:49:03.894658980Z" level=info msg="StopPodSandbox for \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\" returns successfully" Dec 13 03:49:03.897147 env[1556]: time="2024-12-13T03:49:03.895331975Z" level=info msg="RemovePodSandbox for \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\"" Dec 13 03:49:03.897147 env[1556]: time="2024-12-13T03:49:03.895423646Z" level=info msg="Forcibly stopping sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\"" Dec 13 03:49:03.926880 kubelet[1913]: I1213 03:49:03.926781 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=19.547960797 podStartE2EDuration="19.926694792s" podCreationTimestamp="2024-12-13 03:48:44 +0000 UTC" firstStartedPulling="2024-12-13 03:49:02.647125023 +0000 UTC m=+59.363762381" lastFinishedPulling="2024-12-13 03:49:03.025858949 +0000 UTC m=+59.742496376" observedRunningTime="2024-12-13 03:49:03.925910208 +0000 UTC m=+60.642547626" watchObservedRunningTime="2024-12-13 03:49:03.926694792 +0000 UTC m=+60.643332197" Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.959 [WARNING][3927] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5dbc7550-83db-45de-92ae-7e7a04b241bc", ResourceVersion:"1723", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 48, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"83dbec8617bfa60918e4171187205da6c8c14856ea0a7898f0f6fbd859956bf5", Pod:"nginx-deployment-6d5f899847-qxb7k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3521822769b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.959 [INFO][3927] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.960 [INFO][3927] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" iface="eth0" netns="" Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.960 [INFO][3927] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.960 [INFO][3927] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.977 [INFO][3941] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" HandleID="k8s-pod-network.ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.977 [INFO][3941] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.977 [INFO][3941] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.982 [WARNING][3941] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" HandleID="k8s-pod-network.ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.982 [INFO][3941] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" HandleID="k8s-pod-network.ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Workload="10.67.80.37-k8s-nginx--deployment--6d5f899847--qxb7k-eth0" Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.983 [INFO][3941] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:49:03.985731 env[1556]: 2024-12-13 03:49:03.984 [INFO][3927] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7" Dec 13 03:49:03.986303 env[1556]: time="2024-12-13T03:49:03.985722481Z" level=info msg="TearDown network for sandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\" successfully" Dec 13 03:49:03.987452 env[1556]: time="2024-12-13T03:49:03.987398574Z" level=info msg="RemovePodSandbox \"ca7ed38a10f9197f641ad3b8832db4ee69fd13b2ad4ac72962bf50ccd8725cc7\" returns successfully" Dec 13 03:49:04.105656 systemd-networkd[1308]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 03:49:04.655015 kubelet[1913]: E1213 03:49:04.654908 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:49:05.655950 kubelet[1913]: E1213 03:49:05.655842 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:49:06.657037 kubelet[1913]: E1213 03:49:06.656930 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"