Dec 13 15:28:34.559815 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 15:28:34.559827 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:28:34.559835 kernel: BIOS-provided physical RAM map: Dec 13 15:28:34.559839 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Dec 13 15:28:34.559844 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Dec 13 15:28:34.559848 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Dec 13 15:28:34.559853 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Dec 13 15:28:34.559858 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Dec 13 15:28:34.559863 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000819dafff] usable Dec 13 15:28:34.559867 kernel: BIOS-e820: [mem 0x00000000819db000-0x00000000819dbfff] ACPI NVS Dec 13 15:28:34.559872 kernel: BIOS-e820: [mem 0x00000000819dc000-0x00000000819dcfff] reserved Dec 13 15:28:34.559876 kernel: BIOS-e820: [mem 0x00000000819dd000-0x000000008afccfff] usable Dec 13 15:28:34.559880 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Dec 13 15:28:34.559884 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Dec 13 15:28:34.559889 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Dec 13 15:28:34.559894 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Dec 13 15:28:34.559898 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Dec 13 15:28:34.559902 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Dec 13 15:28:34.559906 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Dec 13 15:28:34.559910 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Dec 13 15:28:34.559914 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Dec 13 15:28:34.559918 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 15:28:34.559922 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Dec 13 15:28:34.559926 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Dec 13 15:28:34.559931 kernel: NX (Execute Disable) protection: active Dec 13 15:28:34.559935 kernel: SMBIOS 3.2.1 present. Dec 13 15:28:34.559940 kernel: DMI: Supermicro X11SCM-F/X11SCM-F, BIOS 1.9 09/16/2022 Dec 13 15:28:34.559944 kernel: tsc: Detected 3400.000 MHz processor Dec 13 15:28:34.559948 kernel: tsc: Detected 3399.906 MHz TSC Dec 13 15:28:34.559952 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 15:28:34.559957 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 15:28:34.559961 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Dec 13 15:28:34.559965 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 15:28:34.559970 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Dec 13 15:28:34.559974 kernel: Using GB pages for direct mapping Dec 13 15:28:34.559978 kernel: ACPI: Early table checksum verification disabled Dec 13 15:28:34.559983 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Dec 13 15:28:34.559987 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Dec 13 15:28:34.559992 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Dec 13 15:28:34.559996 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Dec 13 15:28:34.560002 kernel: ACPI: FACS 0x000000008C66CF80 000040 Dec 13 15:28:34.560007 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Dec 13 15:28:34.560012 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Dec 13 15:28:34.560017 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Dec 13 15:28:34.560022 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Dec 13 15:28:34.560026 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Dec 13 15:28:34.560031 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Dec 13 15:28:34.560036 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Dec 13 15:28:34.560040 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Dec 13 15:28:34.560045 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:28:34.560050 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Dec 13 15:28:34.560055 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Dec 13 15:28:34.560060 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:28:34.560064 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:28:34.560069 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Dec 13 15:28:34.560073 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Dec 13 15:28:34.560078 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:28:34.560083 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:28:34.560088 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Dec 13 15:28:34.560093 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Dec 13 15:28:34.560097 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Dec 13 15:28:34.560102 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Dec 13 15:28:34.560106 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Dec 13 15:28:34.560111 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Dec 13 15:28:34.560115 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Dec 13 15:28:34.560120 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Dec 13 15:28:34.560125 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Dec 13 15:28:34.560130 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Dec 13 15:28:34.560135 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Dec 13 15:28:34.560139 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Dec 13 15:28:34.560144 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Dec 13 15:28:34.560148 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Dec 13 15:28:34.560153 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Dec 13 15:28:34.560158 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Dec 13 15:28:34.560162 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Dec 13 15:28:34.560168 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Dec 13 15:28:34.560172 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Dec 13 15:28:34.560177 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Dec 13 15:28:34.560181 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Dec 13 15:28:34.560186 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Dec 13 15:28:34.560191 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Dec 13 15:28:34.560195 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Dec 13 15:28:34.560200 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Dec 13 15:28:34.560204 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Dec 13 15:28:34.560210 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Dec 13 15:28:34.560214 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Dec 13 15:28:34.560219 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Dec 13 15:28:34.560223 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Dec 13 15:28:34.560228 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Dec 13 15:28:34.560233 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Dec 13 15:28:34.560237 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Dec 13 15:28:34.560242 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Dec 13 15:28:34.560247 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Dec 13 15:28:34.560252 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Dec 13 15:28:34.560257 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Dec 13 15:28:34.560261 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Dec 13 15:28:34.560266 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Dec 13 15:28:34.560270 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Dec 13 15:28:34.560275 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Dec 13 15:28:34.560279 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Dec 13 15:28:34.560284 kernel: No NUMA configuration found Dec 13 15:28:34.560289 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Dec 13 15:28:34.560294 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Dec 13 15:28:34.560299 kernel: Zone ranges: Dec 13 15:28:34.560303 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 15:28:34.560308 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 15:28:34.560312 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Dec 13 15:28:34.560317 kernel: Movable zone start for each node Dec 13 15:28:34.560322 kernel: Early memory node ranges Dec 13 15:28:34.560326 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Dec 13 15:28:34.560331 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Dec 13 15:28:34.560335 kernel: node 0: [mem 0x0000000040400000-0x00000000819dafff] Dec 13 15:28:34.560341 kernel: node 0: [mem 0x00000000819dd000-0x000000008afccfff] Dec 13 15:28:34.560346 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Dec 13 15:28:34.560350 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Dec 13 15:28:34.560355 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Dec 13 15:28:34.560359 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Dec 13 15:28:34.560364 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 15:28:34.560372 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Dec 13 15:28:34.560378 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Dec 13 15:28:34.560382 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Dec 13 15:28:34.560388 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Dec 13 15:28:34.560393 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Dec 13 15:28:34.560398 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Dec 13 15:28:34.560403 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Dec 13 15:28:34.560408 kernel: ACPI: PM-Timer IO Port: 0x1808 Dec 13 15:28:34.560413 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 15:28:34.560418 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 15:28:34.560423 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 15:28:34.560429 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 15:28:34.560434 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 15:28:34.560438 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 15:28:34.560443 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 15:28:34.560448 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 15:28:34.560453 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 15:28:34.560458 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 15:28:34.560463 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 15:28:34.560468 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 15:28:34.560473 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 15:28:34.560478 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 15:28:34.560483 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 15:28:34.560488 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 15:28:34.560493 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Dec 13 15:28:34.560498 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 15:28:34.560503 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 15:28:34.560508 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 15:28:34.560513 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 15:28:34.560518 kernel: TSC deadline timer available Dec 13 15:28:34.560523 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Dec 13 15:28:34.560528 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Dec 13 15:28:34.560533 kernel: Booting paravirtualized kernel on bare hardware Dec 13 15:28:34.560538 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 15:28:34.560543 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 15:28:34.560548 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 15:28:34.560553 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 15:28:34.560558 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 15:28:34.560563 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Dec 13 15:28:34.560568 kernel: Policy zone: Normal Dec 13 15:28:34.560574 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:28:34.560579 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 15:28:34.560584 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Dec 13 15:28:34.560589 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Dec 13 15:28:34.560594 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 15:28:34.560599 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 730116K reserved, 0K cma-reserved) Dec 13 15:28:34.560605 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 15:28:34.560610 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 15:28:34.560617 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 15:28:34.560638 kernel: rcu: Hierarchical RCU implementation. Dec 13 15:28:34.560643 kernel: rcu: RCU event tracing is enabled. Dec 13 15:28:34.560648 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 15:28:34.560653 kernel: Rude variant of Tasks RCU enabled. Dec 13 15:28:34.560658 kernel: Tracing variant of Tasks RCU enabled. Dec 13 15:28:34.560681 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 15:28:34.560686 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 15:28:34.560691 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Dec 13 15:28:34.560696 kernel: random: crng init done Dec 13 15:28:34.560700 kernel: Console: colour dummy device 80x25 Dec 13 15:28:34.560705 kernel: printk: console [tty0] enabled Dec 13 15:28:34.560710 kernel: printk: console [ttyS1] enabled Dec 13 15:28:34.560715 kernel: ACPI: Core revision 20210730 Dec 13 15:28:34.560720 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Dec 13 15:28:34.560725 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 15:28:34.560731 kernel: DMAR: Host address width 39 Dec 13 15:28:34.560736 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Dec 13 15:28:34.560741 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Dec 13 15:28:34.560746 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Dec 13 15:28:34.560751 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Dec 13 15:28:34.560756 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Dec 13 15:28:34.560760 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Dec 13 15:28:34.560765 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Dec 13 15:28:34.560770 kernel: x2apic enabled Dec 13 15:28:34.560776 kernel: Switched APIC routing to cluster x2apic. Dec 13 15:28:34.560781 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Dec 13 15:28:34.560786 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Dec 13 15:28:34.560791 kernel: CPU0: Thermal monitoring enabled (TM1) Dec 13 15:28:34.560796 kernel: process: using mwait in idle threads Dec 13 15:28:34.560801 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 15:28:34.560806 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 15:28:34.560810 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 15:28:34.560815 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 15:28:34.560821 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 15:28:34.560826 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 15:28:34.560831 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 15:28:34.560836 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 15:28:34.560841 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 15:28:34.560846 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 15:28:34.560850 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 15:28:34.560855 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 15:28:34.560860 kernel: TAA: Mitigation: TSX disabled Dec 13 15:28:34.560865 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Dec 13 15:28:34.560870 kernel: SRBDS: Mitigation: Microcode Dec 13 15:28:34.560875 kernel: GDS: Vulnerable: No microcode Dec 13 15:28:34.560880 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 15:28:34.560885 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 15:28:34.560890 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 15:28:34.560895 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 15:28:34.560900 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 15:28:34.560905 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 15:28:34.560909 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 15:28:34.560914 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 15:28:34.560919 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Dec 13 15:28:34.560924 kernel: Freeing SMP alternatives memory: 32K Dec 13 15:28:34.560930 kernel: pid_max: default: 32768 minimum: 301 Dec 13 15:28:34.560935 kernel: LSM: Security Framework initializing Dec 13 15:28:34.560939 kernel: SELinux: Initializing. Dec 13 15:28:34.560944 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 15:28:34.560949 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 15:28:34.560954 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Dec 13 15:28:34.560959 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 15:28:34.560964 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Dec 13 15:28:34.560969 kernel: ... version: 4 Dec 13 15:28:34.560974 kernel: ... bit width: 48 Dec 13 15:28:34.560979 kernel: ... generic registers: 4 Dec 13 15:28:34.560984 kernel: ... value mask: 0000ffffffffffff Dec 13 15:28:34.560989 kernel: ... max period: 00007fffffffffff Dec 13 15:28:34.560994 kernel: ... fixed-purpose events: 3 Dec 13 15:28:34.560999 kernel: ... event mask: 000000070000000f Dec 13 15:28:34.561004 kernel: signal: max sigframe size: 2032 Dec 13 15:28:34.561009 kernel: rcu: Hierarchical SRCU implementation. Dec 13 15:28:34.561014 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Dec 13 15:28:34.561019 kernel: smp: Bringing up secondary CPUs ... Dec 13 15:28:34.561024 kernel: x86: Booting SMP configuration: Dec 13 15:28:34.561029 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Dec 13 15:28:34.561035 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 15:28:34.561040 kernel: #9 #10 #11 #12 #13 #14 #15 Dec 13 15:28:34.561044 kernel: smp: Brought up 1 node, 16 CPUs Dec 13 15:28:34.561049 kernel: smpboot: Max logical packages: 1 Dec 13 15:28:34.561054 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Dec 13 15:28:34.561059 kernel: devtmpfs: initialized Dec 13 15:28:34.561064 kernel: x86/mm: Memory block size: 128MB Dec 13 15:28:34.561069 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x819db000-0x819dbfff] (4096 bytes) Dec 13 15:28:34.561075 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Dec 13 15:28:34.561080 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 15:28:34.561085 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 15:28:34.561090 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 15:28:34.561095 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 15:28:34.561100 kernel: audit: initializing netlink subsys (disabled) Dec 13 15:28:34.561105 kernel: audit: type=2000 audit(1734103709.041:1): state=initialized audit_enabled=0 res=1 Dec 13 15:28:34.561110 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 15:28:34.561115 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 15:28:34.561120 kernel: cpuidle: using governor menu Dec 13 15:28:34.561125 kernel: ACPI: bus type PCI registered Dec 13 15:28:34.561130 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 15:28:34.561135 kernel: dca service started, version 1.12.1 Dec 13 15:28:34.561140 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Dec 13 15:28:34.561145 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Dec 13 15:28:34.561150 kernel: PCI: Using configuration type 1 for base access Dec 13 15:28:34.561155 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Dec 13 15:28:34.561160 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 15:28:34.561166 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 15:28:34.561170 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 15:28:34.561175 kernel: ACPI: Added _OSI(Module Device) Dec 13 15:28:34.561180 kernel: ACPI: Added _OSI(Processor Device) Dec 13 15:28:34.561185 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 15:28:34.561190 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 15:28:34.561195 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 15:28:34.561200 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 15:28:34.561205 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 15:28:34.561211 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Dec 13 15:28:34.561216 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:28:34.561221 kernel: ACPI: SSDT 0xFFFF9BB180219200 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Dec 13 15:28:34.561226 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Dec 13 15:28:34.561231 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:28:34.561235 kernel: ACPI: SSDT 0xFFFF9BB181AE6400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Dec 13 15:28:34.561240 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:28:34.561245 kernel: ACPI: SSDT 0xFFFF9BB181A5D800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Dec 13 15:28:34.561251 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:28:34.561256 kernel: ACPI: SSDT 0xFFFF9BB181B4F000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Dec 13 15:28:34.561261 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:28:34.561266 kernel: ACPI: SSDT 0xFFFF9BB18014F000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Dec 13 15:28:34.561271 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:28:34.561276 kernel: ACPI: SSDT 0xFFFF9BB181AE2000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Dec 13 15:28:34.561280 kernel: ACPI: Interpreter enabled Dec 13 15:28:34.561285 kernel: ACPI: PM: (supports S0 S5) Dec 13 15:28:34.561290 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 15:28:34.561295 kernel: HEST: Enabling Firmware First mode for corrected errors. Dec 13 15:28:34.561300 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Dec 13 15:28:34.561306 kernel: HEST: Table parsing has been initialized. Dec 13 15:28:34.561311 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Dec 13 15:28:34.561316 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 15:28:34.561321 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Dec 13 15:28:34.561326 kernel: ACPI: PM: Power Resource [USBC] Dec 13 15:28:34.561330 kernel: ACPI: PM: Power Resource [V0PR] Dec 13 15:28:34.561335 kernel: ACPI: PM: Power Resource [V1PR] Dec 13 15:28:34.561340 kernel: ACPI: PM: Power Resource [V2PR] Dec 13 15:28:34.561345 kernel: ACPI: PM: Power Resource [WRST] Dec 13 15:28:34.561351 kernel: ACPI: PM: Power Resource [FN00] Dec 13 15:28:34.561356 kernel: ACPI: PM: Power Resource [FN01] Dec 13 15:28:34.561361 kernel: ACPI: PM: Power Resource [FN02] Dec 13 15:28:34.561365 kernel: ACPI: PM: Power Resource [FN03] Dec 13 15:28:34.561370 kernel: ACPI: PM: Power Resource [FN04] Dec 13 15:28:34.561375 kernel: ACPI: PM: Power Resource [PIN] Dec 13 15:28:34.561380 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Dec 13 15:28:34.561447 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 15:28:34.561494 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Dec 13 15:28:34.561536 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Dec 13 15:28:34.561543 kernel: PCI host bridge to bus 0000:00 Dec 13 15:28:34.561589 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 15:28:34.561648 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 15:28:34.561686 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 15:28:34.561723 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Dec 13 15:28:34.561762 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Dec 13 15:28:34.561799 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Dec 13 15:28:34.561852 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Dec 13 15:28:34.561901 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Dec 13 15:28:34.561946 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Dec 13 15:28:34.561993 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Dec 13 15:28:34.562039 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Dec 13 15:28:34.562085 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Dec 13 15:28:34.562130 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Dec 13 15:28:34.562180 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Dec 13 15:28:34.562223 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Dec 13 15:28:34.562267 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Dec 13 15:28:34.562316 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Dec 13 15:28:34.562358 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Dec 13 15:28:34.562401 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Dec 13 15:28:34.562448 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Dec 13 15:28:34.562491 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 15:28:34.562537 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Dec 13 15:28:34.562581 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 15:28:34.562630 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Dec 13 15:28:34.562672 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Dec 13 15:28:34.562713 kernel: pci 0000:00:16.0: PME# supported from D3hot Dec 13 15:28:34.562759 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Dec 13 15:28:34.562802 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Dec 13 15:28:34.562845 kernel: pci 0000:00:16.1: PME# supported from D3hot Dec 13 15:28:34.562894 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Dec 13 15:28:34.562937 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Dec 13 15:28:34.562979 kernel: pci 0000:00:16.4: PME# supported from D3hot Dec 13 15:28:34.563025 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Dec 13 15:28:34.563069 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Dec 13 15:28:34.563112 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Dec 13 15:28:34.563160 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Dec 13 15:28:34.563204 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Dec 13 15:28:34.563247 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Dec 13 15:28:34.563289 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Dec 13 15:28:34.563331 kernel: pci 0000:00:17.0: PME# supported from D3hot Dec 13 15:28:34.563378 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Dec 13 15:28:34.563421 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Dec 13 15:28:34.563469 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Dec 13 15:28:34.563514 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Dec 13 15:28:34.563562 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Dec 13 15:28:34.563606 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Dec 13 15:28:34.563657 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Dec 13 15:28:34.563700 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Dec 13 15:28:34.563752 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Dec 13 15:28:34.563795 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Dec 13 15:28:34.563843 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Dec 13 15:28:34.563887 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 15:28:34.563934 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Dec 13 15:28:34.563982 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Dec 13 15:28:34.564024 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Dec 13 15:28:34.564067 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Dec 13 15:28:34.564113 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Dec 13 15:28:34.564155 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Dec 13 15:28:34.564206 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Dec 13 15:28:34.564251 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Dec 13 15:28:34.564296 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Dec 13 15:28:34.564340 kernel: pci 0000:01:00.0: PME# supported from D3cold Dec 13 15:28:34.564384 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 15:28:34.564428 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 15:28:34.564479 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Dec 13 15:28:34.564525 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Dec 13 15:28:34.564569 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Dec 13 15:28:34.564613 kernel: pci 0000:01:00.1: PME# supported from D3cold Dec 13 15:28:34.564662 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 15:28:34.564705 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 15:28:34.564750 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 15:28:34.564793 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 15:28:34.564837 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 15:28:34.564901 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 15:28:34.564951 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Dec 13 15:28:34.564996 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Dec 13 15:28:34.565040 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Dec 13 15:28:34.565084 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Dec 13 15:28:34.565127 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Dec 13 15:28:34.565171 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 15:28:34.565215 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 15:28:34.565259 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 15:28:34.565301 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 15:28:34.565348 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Dec 13 15:28:34.565425 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Dec 13 15:28:34.565493 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Dec 13 15:28:34.565537 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Dec 13 15:28:34.565581 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Dec 13 15:28:34.565647 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Dec 13 15:28:34.565709 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 15:28:34.565752 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 15:28:34.565794 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 15:28:34.565838 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 15:28:34.565886 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Dec 13 15:28:34.565929 kernel: pci 0000:06:00.0: enabling Extended Tags Dec 13 15:28:34.565975 kernel: pci 0000:06:00.0: supports D1 D2 Dec 13 15:28:34.566018 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 15:28:34.566061 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 15:28:34.566103 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 15:28:34.566145 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:28:34.566192 kernel: pci_bus 0000:07: extended config space not accessible Dec 13 15:28:34.566242 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Dec 13 15:28:34.566291 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Dec 13 15:28:34.566337 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Dec 13 15:28:34.566381 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Dec 13 15:28:34.566428 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 15:28:34.566472 kernel: pci 0000:07:00.0: supports D1 D2 Dec 13 15:28:34.566519 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 15:28:34.566562 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 15:28:34.566607 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 15:28:34.566695 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:28:34.566703 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Dec 13 15:28:34.566709 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Dec 13 15:28:34.566714 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Dec 13 15:28:34.566721 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Dec 13 15:28:34.566726 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Dec 13 15:28:34.566731 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Dec 13 15:28:34.566736 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Dec 13 15:28:34.566742 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Dec 13 15:28:34.566748 kernel: iommu: Default domain type: Translated Dec 13 15:28:34.566753 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 15:28:34.566798 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Dec 13 15:28:34.566843 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 15:28:34.566889 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Dec 13 15:28:34.566896 kernel: vgaarb: loaded Dec 13 15:28:34.566902 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 15:28:34.566907 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 15:28:34.566914 kernel: PTP clock support registered Dec 13 15:28:34.566919 kernel: PCI: Using ACPI for IRQ routing Dec 13 15:28:34.566925 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 15:28:34.566930 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Dec 13 15:28:34.566936 kernel: e820: reserve RAM buffer [mem 0x819db000-0x83ffffff] Dec 13 15:28:34.566941 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Dec 13 15:28:34.566946 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Dec 13 15:28:34.566952 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Dec 13 15:28:34.566957 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Dec 13 15:28:34.566963 kernel: clocksource: Switched to clocksource tsc-early Dec 13 15:28:34.566968 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 15:28:34.566973 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 15:28:34.566979 kernel: pnp: PnP ACPI init Dec 13 15:28:34.567024 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Dec 13 15:28:34.567066 kernel: pnp 00:02: [dma 0 disabled] Dec 13 15:28:34.567109 kernel: pnp 00:03: [dma 0 disabled] Dec 13 15:28:34.567152 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Dec 13 15:28:34.567192 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Dec 13 15:28:34.567232 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Dec 13 15:28:34.567274 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Dec 13 15:28:34.567312 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Dec 13 15:28:34.567350 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Dec 13 15:28:34.567389 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Dec 13 15:28:34.567426 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Dec 13 15:28:34.567464 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Dec 13 15:28:34.567501 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Dec 13 15:28:34.567539 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Dec 13 15:28:34.567582 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Dec 13 15:28:34.567645 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Dec 13 15:28:34.567704 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Dec 13 15:28:34.567742 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Dec 13 15:28:34.567780 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Dec 13 15:28:34.567817 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Dec 13 15:28:34.567855 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Dec 13 15:28:34.567895 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Dec 13 15:28:34.567903 kernel: pnp: PnP ACPI: found 10 devices Dec 13 15:28:34.567910 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 15:28:34.567915 kernel: NET: Registered PF_INET protocol family Dec 13 15:28:34.567920 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 15:28:34.567926 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 15:28:34.567931 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 15:28:34.567937 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 15:28:34.567942 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 15:28:34.567947 kernel: TCP: Hash tables configured (established 262144 bind 65536) Dec 13 15:28:34.567953 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 15:28:34.567959 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 15:28:34.567964 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 15:28:34.567970 kernel: NET: Registered PF_XDP protocol family Dec 13 15:28:34.568012 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Dec 13 15:28:34.568055 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Dec 13 15:28:34.568097 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Dec 13 15:28:34.568141 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 15:28:34.568184 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 15:28:34.568231 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 15:28:34.568276 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 15:28:34.568319 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 15:28:34.568361 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 15:28:34.568404 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 15:28:34.568446 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 15:28:34.568491 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 15:28:34.568533 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 15:28:34.568575 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 15:28:34.568620 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 15:28:34.568686 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 15:28:34.568729 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 15:28:34.568772 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 15:28:34.568819 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 15:28:34.568862 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 15:28:34.568907 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:28:34.568950 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 15:28:34.568994 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 15:28:34.569037 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:28:34.569077 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Dec 13 15:28:34.569116 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 15:28:34.569153 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 15:28:34.569194 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 15:28:34.569231 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Dec 13 15:28:34.569268 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Dec 13 15:28:34.569313 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Dec 13 15:28:34.569354 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 15:28:34.569398 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Dec 13 15:28:34.569439 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Dec 13 15:28:34.569483 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Dec 13 15:28:34.569523 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Dec 13 15:28:34.569569 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Dec 13 15:28:34.569609 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Dec 13 15:28:34.569655 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Dec 13 15:28:34.569698 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Dec 13 15:28:34.569707 kernel: PCI: CLS 64 bytes, default 64 Dec 13 15:28:34.569713 kernel: DMAR: No ATSR found Dec 13 15:28:34.569718 kernel: DMAR: No SATC found Dec 13 15:28:34.569724 kernel: DMAR: dmar0: Using Queued invalidation Dec 13 15:28:34.569766 kernel: pci 0000:00:00.0: Adding to iommu group 0 Dec 13 15:28:34.569812 kernel: pci 0000:00:01.0: Adding to iommu group 1 Dec 13 15:28:34.569869 kernel: pci 0000:00:08.0: Adding to iommu group 2 Dec 13 15:28:34.569913 kernel: pci 0000:00:12.0: Adding to iommu group 3 Dec 13 15:28:34.569956 kernel: pci 0000:00:14.0: Adding to iommu group 4 Dec 13 15:28:34.569997 kernel: pci 0000:00:14.2: Adding to iommu group 4 Dec 13 15:28:34.570040 kernel: pci 0000:00:15.0: Adding to iommu group 5 Dec 13 15:28:34.570081 kernel: pci 0000:00:15.1: Adding to iommu group 5 Dec 13 15:28:34.570123 kernel: pci 0000:00:16.0: Adding to iommu group 6 Dec 13 15:28:34.570164 kernel: pci 0000:00:16.1: Adding to iommu group 6 Dec 13 15:28:34.570205 kernel: pci 0000:00:16.4: Adding to iommu group 6 Dec 13 15:28:34.570246 kernel: pci 0000:00:17.0: Adding to iommu group 7 Dec 13 15:28:34.570288 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Dec 13 15:28:34.570332 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Dec 13 15:28:34.570374 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Dec 13 15:28:34.570417 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Dec 13 15:28:34.570458 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Dec 13 15:28:34.570500 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Dec 13 15:28:34.570542 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Dec 13 15:28:34.570584 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Dec 13 15:28:34.570649 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Dec 13 15:28:34.570715 kernel: pci 0000:01:00.0: Adding to iommu group 1 Dec 13 15:28:34.570760 kernel: pci 0000:01:00.1: Adding to iommu group 1 Dec 13 15:28:34.570803 kernel: pci 0000:03:00.0: Adding to iommu group 15 Dec 13 15:28:34.570847 kernel: pci 0000:04:00.0: Adding to iommu group 16 Dec 13 15:28:34.570891 kernel: pci 0000:06:00.0: Adding to iommu group 17 Dec 13 15:28:34.570939 kernel: pci 0000:07:00.0: Adding to iommu group 17 Dec 13 15:28:34.570947 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Dec 13 15:28:34.570952 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 15:28:34.570959 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Dec 13 15:28:34.570965 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Dec 13 15:28:34.570970 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Dec 13 15:28:34.570975 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Dec 13 15:28:34.570981 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Dec 13 15:28:34.571026 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Dec 13 15:28:34.571034 kernel: Initialise system trusted keyrings Dec 13 15:28:34.571040 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Dec 13 15:28:34.571046 kernel: Key type asymmetric registered Dec 13 15:28:34.571051 kernel: Asymmetric key parser 'x509' registered Dec 13 15:28:34.571057 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 15:28:34.571062 kernel: io scheduler mq-deadline registered Dec 13 15:28:34.571067 kernel: io scheduler kyber registered Dec 13 15:28:34.571073 kernel: io scheduler bfq registered Dec 13 15:28:34.571116 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Dec 13 15:28:34.571158 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Dec 13 15:28:34.571202 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Dec 13 15:28:34.571246 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Dec 13 15:28:34.571288 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Dec 13 15:28:34.571331 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Dec 13 15:28:34.571377 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Dec 13 15:28:34.571385 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Dec 13 15:28:34.571391 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Dec 13 15:28:34.571396 kernel: pstore: Registered erst as persistent store backend Dec 13 15:28:34.571402 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 15:28:34.571408 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 15:28:34.571414 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 15:28:34.571419 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 15:28:34.571425 kernel: hpet_acpi_add: no address or irqs in _CRS Dec 13 15:28:34.571467 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Dec 13 15:28:34.571475 kernel: i8042: PNP: No PS/2 controller found. Dec 13 15:28:34.571513 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Dec 13 15:28:34.571553 kernel: rtc_cmos rtc_cmos: registered as rtc0 Dec 13 15:28:34.571593 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-12-13T15:28:33 UTC (1734103713) Dec 13 15:28:34.571657 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Dec 13 15:28:34.571683 kernel: fail to initialize ptp_kvm Dec 13 15:28:34.571688 kernel: intel_pstate: Intel P-state driver initializing Dec 13 15:28:34.571694 kernel: intel_pstate: Disabling energy efficiency optimization Dec 13 15:28:34.571699 kernel: intel_pstate: HWP enabled Dec 13 15:28:34.571704 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Dec 13 15:28:34.571710 kernel: vesafb: scrolling: redraw Dec 13 15:28:34.571716 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Dec 13 15:28:34.571722 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x0000000047ad58c4, using 768k, total 768k Dec 13 15:28:34.571727 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 15:28:34.571732 kernel: fb0: VESA VGA frame buffer device Dec 13 15:28:34.571738 kernel: NET: Registered PF_INET6 protocol family Dec 13 15:28:34.571743 kernel: Segment Routing with IPv6 Dec 13 15:28:34.571748 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 15:28:34.571753 kernel: NET: Registered PF_PACKET protocol family Dec 13 15:28:34.571758 kernel: Key type dns_resolver registered Dec 13 15:28:34.571764 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Dec 13 15:28:34.571770 kernel: microcode: Microcode Update Driver: v2.2. Dec 13 15:28:34.571775 kernel: IPI shorthand broadcast: enabled Dec 13 15:28:34.571780 kernel: sched_clock: Marking stable (1734001539, 1339106116)->(4516827386, -1443719731) Dec 13 15:28:34.571786 kernel: registered taskstats version 1 Dec 13 15:28:34.571791 kernel: Loading compiled-in X.509 certificates Dec 13 15:28:34.571796 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 15:28:34.571801 kernel: Key type .fscrypt registered Dec 13 15:28:34.571806 kernel: Key type fscrypt-provisioning registered Dec 13 15:28:34.571812 kernel: pstore: Using crash dump compression: deflate Dec 13 15:28:34.571818 kernel: ima: Allocated hash algorithm: sha1 Dec 13 15:28:34.571823 kernel: ima: No architecture policies found Dec 13 15:28:34.571828 kernel: clk: Disabling unused clocks Dec 13 15:28:34.571834 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 15:28:34.571839 kernel: Write protecting the kernel read-only data: 28672k Dec 13 15:28:34.571844 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 15:28:34.571849 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 15:28:34.571855 kernel: Run /init as init process Dec 13 15:28:34.571861 kernel: with arguments: Dec 13 15:28:34.571866 kernel: /init Dec 13 15:28:34.571871 kernel: with environment: Dec 13 15:28:34.571876 kernel: HOME=/ Dec 13 15:28:34.571881 kernel: TERM=linux Dec 13 15:28:34.571886 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 15:28:34.571893 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:28:34.571899 systemd[1]: Detected architecture x86-64. Dec 13 15:28:34.571906 systemd[1]: Running in initrd. Dec 13 15:28:34.571911 systemd[1]: No hostname configured, using default hostname. Dec 13 15:28:34.571916 systemd[1]: Hostname set to . Dec 13 15:28:34.571922 systemd[1]: Initializing machine ID from random generator. Dec 13 15:28:34.571927 systemd[1]: Queued start job for default target initrd.target. Dec 13 15:28:34.571933 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:28:34.571938 systemd[1]: Reached target cryptsetup.target. Dec 13 15:28:34.571944 systemd[1]: Reached target paths.target. Dec 13 15:28:34.571950 systemd[1]: Reached target slices.target. Dec 13 15:28:34.571955 systemd[1]: Reached target swap.target. Dec 13 15:28:34.571960 systemd[1]: Reached target timers.target. Dec 13 15:28:34.571966 systemd[1]: Listening on iscsid.socket. Dec 13 15:28:34.571972 systemd[1]: Listening on iscsiuio.socket. Dec 13 15:28:34.571977 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 15:28:34.571982 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 15:28:34.571989 systemd[1]: Listening on systemd-journald.socket. Dec 13 15:28:34.571994 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Dec 13 15:28:34.572000 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Dec 13 15:28:34.572006 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:28:34.572011 kernel: clocksource: Switched to clocksource tsc Dec 13 15:28:34.572016 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:28:34.572022 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:28:34.572027 systemd[1]: Reached target sockets.target. Dec 13 15:28:34.572033 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:28:34.572039 systemd[1]: Finished network-cleanup.service. Dec 13 15:28:34.572044 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 15:28:34.572050 systemd[1]: Starting systemd-journald.service... Dec 13 15:28:34.572055 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:28:34.572064 systemd-journald[266]: Journal started Dec 13 15:28:34.572089 systemd-journald[266]: Runtime Journal (/run/log/journal/16672e356b494ba79d11faf6c9a949c0) is 8.0M, max 640.1M, 632.1M free. Dec 13 15:28:34.574166 systemd-modules-load[267]: Inserted module 'overlay' Dec 13 15:28:34.580000 audit: BPF prog-id=6 op=LOAD Dec 13 15:28:34.598661 kernel: audit: type=1334 audit(1734103714.580:2): prog-id=6 op=LOAD Dec 13 15:28:34.598678 systemd[1]: Starting systemd-resolved.service... Dec 13 15:28:34.647620 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 15:28:34.647636 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 15:28:34.681674 kernel: Bridge firewalling registered Dec 13 15:28:34.681707 systemd[1]: Started systemd-journald.service. Dec 13 15:28:34.696154 systemd-modules-load[267]: Inserted module 'br_netfilter' Dec 13 15:28:34.743954 kernel: audit: type=1130 audit(1734103714.703:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:34.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:34.698475 systemd-resolved[269]: Positive Trust Anchors: Dec 13 15:28:34.800950 kernel: SCSI subsystem initialized Dec 13 15:28:34.800970 kernel: audit: type=1130 audit(1734103714.755:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:34.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:34.698480 systemd-resolved[269]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:28:34.923653 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 15:28:34.923666 kernel: audit: type=1130 audit(1734103714.826:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:34.923674 kernel: device-mapper: uevent: version 1.0.3 Dec 13 15:28:34.923682 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 15:28:34.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:34.698499 systemd-resolved[269]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:28:34.996858 kernel: audit: type=1130 audit(1734103714.930:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:34.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:34.700028 systemd-resolved[269]: Defaulting to hostname 'linux'. Dec 13 15:28:35.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:34.703835 systemd[1]: Started systemd-resolved.service. Dec 13 15:28:35.105202 kernel: audit: type=1130 audit(1734103715.005:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:35.105225 kernel: audit: type=1130 audit(1734103715.058:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:35.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:34.755801 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:28:34.826769 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 15:28:34.925752 systemd-modules-load[267]: Inserted module 'dm_multipath' Dec 13 15:28:34.931857 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:28:35.005955 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 15:28:35.058879 systemd[1]: Reached target nss-lookup.target. Dec 13 15:28:35.114210 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 15:28:35.134148 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:28:35.134450 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:28:35.137395 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:28:35.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:35.138176 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:28:35.187817 kernel: audit: type=1130 audit(1734103715.136:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:35.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:35.199954 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 15:28:35.264714 kernel: audit: type=1130 audit(1734103715.199:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:35.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:35.257214 systemd[1]: Starting dracut-cmdline.service... Dec 13 15:28:35.279723 dracut-cmdline[290]: dracut-dracut-053 Dec 13 15:28:35.279723 dracut-cmdline[290]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 15:28:35.279723 dracut-cmdline[290]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:28:35.350656 kernel: Loading iSCSI transport class v2.0-870. Dec 13 15:28:35.350668 kernel: iscsi: registered transport (tcp) Dec 13 15:28:35.407233 kernel: iscsi: registered transport (qla4xxx) Dec 13 15:28:35.407279 kernel: QLogic iSCSI HBA Driver Dec 13 15:28:35.423450 systemd[1]: Finished dracut-cmdline.service. Dec 13 15:28:35.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:35.433309 systemd[1]: Starting dracut-pre-udev.service... Dec 13 15:28:35.489692 kernel: raid6: avx2x4 gen() 45820 MB/s Dec 13 15:28:35.524621 kernel: raid6: avx2x4 xor() 14202 MB/s Dec 13 15:28:35.559620 kernel: raid6: avx2x2 gen() 51905 MB/s Dec 13 15:28:35.594648 kernel: raid6: avx2x2 xor() 32100 MB/s Dec 13 15:28:35.629688 kernel: raid6: avx2x1 gen() 44441 MB/s Dec 13 15:28:35.664684 kernel: raid6: avx2x1 xor() 27897 MB/s Dec 13 15:28:35.697620 kernel: raid6: sse2x4 gen() 21358 MB/s Dec 13 15:28:35.731654 kernel: raid6: sse2x4 xor() 11917 MB/s Dec 13 15:28:35.765648 kernel: raid6: sse2x2 gen() 21615 MB/s Dec 13 15:28:35.799685 kernel: raid6: sse2x2 xor() 13427 MB/s Dec 13 15:28:35.833649 kernel: raid6: sse2x1 gen() 18312 MB/s Dec 13 15:28:35.885517 kernel: raid6: sse2x1 xor() 8901 MB/s Dec 13 15:28:35.885533 kernel: raid6: using algorithm avx2x2 gen() 51905 MB/s Dec 13 15:28:35.885541 kernel: raid6: .... xor() 32100 MB/s, rmw enabled Dec 13 15:28:35.903734 kernel: raid6: using avx2x2 recovery algorithm Dec 13 15:28:35.949648 kernel: xor: automatically using best checksumming function avx Dec 13 15:28:36.028652 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 15:28:36.033983 systemd[1]: Finished dracut-pre-udev.service. Dec 13 15:28:36.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:36.042000 audit: BPF prog-id=7 op=LOAD Dec 13 15:28:36.042000 audit: BPF prog-id=8 op=LOAD Dec 13 15:28:36.043528 systemd[1]: Starting systemd-udevd.service... Dec 13 15:28:36.051716 systemd-udevd[470]: Using default interface naming scheme 'v252'. Dec 13 15:28:36.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:36.057744 systemd[1]: Started systemd-udevd.service. Dec 13 15:28:36.099745 dracut-pre-trigger[483]: rd.md=0: removing MD RAID activation Dec 13 15:28:36.074228 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 15:28:36.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:36.102453 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 15:28:36.117784 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:28:36.168730 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:28:36.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:36.198626 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 15:28:36.200628 kernel: libata version 3.00 loaded. Dec 13 15:28:36.235714 kernel: ACPI: bus type USB registered Dec 13 15:28:36.235749 kernel: usbcore: registered new interface driver usbfs Dec 13 15:28:36.235758 kernel: usbcore: registered new interface driver hub Dec 13 15:28:36.253555 kernel: usbcore: registered new device driver usb Dec 13 15:28:36.271624 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 15:28:36.304901 kernel: AES CTR mode by8 optimization enabled Dec 13 15:28:36.341511 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Dec 13 15:28:36.341544 kernel: mlx5_core 0000:01:00.0: firmware version: 14.28.2006 Dec 13 15:28:37.421300 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Dec 13 15:28:37.421314 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 15:28:37.421376 kernel: ahci 0000:00:17.0: version 3.0 Dec 13 15:28:37.421428 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 15:28:37.421475 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Dec 13 15:28:37.421522 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Dec 13 15:28:37.421569 kernel: pps pps0: new PPS source ptp0 Dec 13 15:28:37.421659 kernel: igb 0000:03:00.0: added PHC on eth0 Dec 13 15:28:37.421757 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 15:28:37.421805 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:74:e8 Dec 13 15:28:37.421853 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Dec 13 15:28:37.421900 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 15:28:37.421947 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Dec 13 15:28:37.421994 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Dec 13 15:28:37.422039 kernel: pps pps1: new PPS source ptp1 Dec 13 15:28:37.422091 kernel: igb 0000:04:00.0: added PHC on eth1 Dec 13 15:28:37.422141 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 15:28:37.422190 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:74:e9 Dec 13 15:28:37.422237 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Dec 13 15:28:37.422284 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 15:28:37.422332 kernel: scsi host0: ahci Dec 13 15:28:37.422382 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 15:28:37.422429 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Dec 13 15:28:37.422477 kernel: scsi host1: ahci Dec 13 15:28:37.422525 kernel: scsi host2: ahci Dec 13 15:28:37.422572 kernel: scsi host3: ahci Dec 13 15:28:37.422622 kernel: scsi host4: ahci Dec 13 15:28:37.422736 kernel: scsi host5: ahci Dec 13 15:28:37.422783 kernel: scsi host6: ahci Dec 13 15:28:37.422831 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 132 Dec 13 15:28:37.422839 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 132 Dec 13 15:28:37.422846 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 132 Dec 13 15:28:37.422852 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 132 Dec 13 15:28:37.422859 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 132 Dec 13 15:28:37.422865 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 132 Dec 13 15:28:37.422872 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 132 Dec 13 15:28:37.422878 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Dec 13 15:28:37.422925 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 15:28:37.422974 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Dec 13 15:28:37.423019 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 15:28:37.423027 kernel: hub 1-0:1.0: USB hub found Dec 13 15:28:37.423081 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 15:28:37.423089 kernel: hub 1-0:1.0: 16 ports detected Dec 13 15:28:37.423138 kernel: ata7: SATA link down (SStatus 0 SControl 300) Dec 13 15:28:37.423147 kernel: hub 2-0:1.0: USB hub found Dec 13 15:28:37.423201 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 15:28:37.423208 kernel: hub 2-0:1.0: 10 ports detected Dec 13 15:28:37.423258 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 15:28:37.423265 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Dec 13 15:28:37.423313 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Dec 13 15:28:37.423320 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 15:28:37.423327 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Dec 13 15:28:37.423333 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 15:28:37.423341 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 15:28:37.423348 kernel: ata1.00: Features: NCQ-prio Dec 13 15:28:37.423354 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 15:28:37.423361 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Dec 13 15:28:37.423450 kernel: ata2.00: Features: NCQ-prio Dec 13 15:28:37.423458 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 15:28:37.423509 kernel: ata1.00: configured for UDMA/133 Dec 13 15:28:37.423517 kernel: ata2.00: configured for UDMA/133 Dec 13 15:28:37.423525 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Dec 13 15:28:37.642547 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Dec 13 15:28:37.642655 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 15:28:37.642664 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:28:37.642671 kernel: sd 1:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 15:28:37.642746 kernel: sd 0:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 15:28:37.642829 kernel: hub 1-14:1.0: USB hub found Dec 13 15:28:37.642946 kernel: hub 1-14:1.0: 4 ports detected Dec 13 15:28:37.643018 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Dec 13 15:28:37.643072 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks Dec 13 15:28:37.643124 kernel: sd 1:0:0:0: [sda] Write Protect is off Dec 13 15:28:37.643176 kernel: sd 0:0:0:0: [sdb] Write Protect is off Dec 13 15:28:37.643228 kernel: sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 Dec 13 15:28:37.643280 kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 15:28:37.643333 kernel: sd 0:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Dec 13 15:28:37.643385 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 15:28:37.643393 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 15:28:37.643444 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 15:28:37.643512 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 15:28:37.643519 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Dec 13 15:28:37.643572 kernel: mlx5_core 0000:01:00.1: firmware version: 14.28.2006 Dec 13 15:28:38.066107 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:28:38.066126 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 15:28:38.066222 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 15:28:38.066236 kernel: GPT:9289727 != 937703087 Dec 13 15:28:38.066247 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 15:28:38.066258 kernel: GPT:9289727 != 937703087 Dec 13 15:28:38.066269 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 15:28:38.066280 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 15:28:38.066291 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:28:38.066303 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk Dec 13 15:28:38.066398 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (517) Dec 13 15:28:38.066410 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Dec 13 15:28:38.066564 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 15:28:38.066635 kernel: port_module: 9 callbacks suppressed Dec 13 15:28:38.066644 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Dec 13 15:28:38.066702 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:28:38.066710 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 15:28:38.066768 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 15:28:38.066776 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:28:38.066783 kernel: GPT:disk_guids don't match. Dec 13 15:28:38.066790 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 15:28:38.066797 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 15:28:38.066804 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:28:38.066811 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 15:28:38.066818 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 15:28:38.066825 kernel: usbcore: registered new interface driver usbhid Dec 13 15:28:38.066833 kernel: usbhid: USB HID core driver Dec 13 15:28:38.066840 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Dec 13 15:28:38.066847 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 15:28:37.670688 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 15:28:37.688746 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 15:28:38.110743 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Dec 13 15:28:38.110829 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Dec 13 15:28:38.123225 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Dec 13 15:28:37.724631 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 15:28:38.180749 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Dec 13 15:28:38.194505 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Dec 13 15:28:38.194575 disk-uuid[669]: Primary Header is updated. Dec 13 15:28:38.194575 disk-uuid[669]: Secondary Entries is updated. Dec 13 15:28:38.194575 disk-uuid[669]: Secondary Header is updated. Dec 13 15:28:37.738648 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 15:28:37.750447 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:28:37.782123 systemd[1]: Starting disk-uuid.service... Dec 13 15:28:38.943171 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:28:38.964571 disk-uuid[670]: The operation has completed successfully. Dec 13 15:28:38.972727 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 15:28:39.006984 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 15:28:39.007029 systemd[1]: Finished disk-uuid.service. Dec 13 15:28:39.114252 kernel: audit: type=1130 audit(1734103719.021:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.114268 kernel: audit: type=1131 audit(1734103719.021:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.022281 systemd[1]: Starting verity-setup.service... Dec 13 15:28:39.145701 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 15:28:39.175461 systemd[1]: Found device dev-mapper-usr.device. Dec 13 15:28:39.184614 systemd[1]: Mounting sysusr-usr.mount... Dec 13 15:28:39.197842 systemd[1]: Finished verity-setup.service. Dec 13 15:28:39.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.260636 kernel: audit: type=1130 audit(1734103719.212:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.290116 systemd[1]: Mounted sysusr-usr.mount. Dec 13 15:28:39.304718 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 15:28:39.296892 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 15:28:39.391041 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:28:39.391061 kernel: BTRFS info (device sdb6): using free space tree Dec 13 15:28:39.391071 kernel: BTRFS info (device sdb6): has skinny extents Dec 13 15:28:39.391080 kernel: BTRFS info (device sdb6): enabling ssd optimizations Dec 13 15:28:39.297283 systemd[1]: Starting ignition-setup.service... Dec 13 15:28:39.318329 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 15:28:39.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.399085 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 15:28:39.525698 kernel: audit: type=1130 audit(1734103719.416:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.525713 kernel: audit: type=1130 audit(1734103719.475:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.416959 systemd[1]: Finished ignition-setup.service. Dec 13 15:28:39.558256 kernel: audit: type=1334 audit(1734103719.534:24): prog-id=9 op=LOAD Dec 13 15:28:39.534000 audit: BPF prog-id=9 op=LOAD Dec 13 15:28:39.476267 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 15:28:39.535581 systemd[1]: Starting systemd-networkd.service... Dec 13 15:28:39.572300 systemd-networkd[875]: lo: Link UP Dec 13 15:28:39.637645 kernel: audit: type=1130 audit(1734103719.585:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.598572 ignition[865]: Ignition 2.14.0 Dec 13 15:28:39.572303 systemd-networkd[875]: lo: Gained carrier Dec 13 15:28:39.598576 ignition[865]: Stage: fetch-offline Dec 13 15:28:39.572593 systemd-networkd[875]: Enumeration completed Dec 13 15:28:39.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.598602 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:28:39.808061 kernel: audit: type=1130 audit(1734103719.674:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.808089 kernel: audit: type=1130 audit(1734103719.733:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.808097 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 15:28:39.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.572664 systemd[1]: Started systemd-networkd.service. Dec 13 15:28:39.840863 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Dec 13 15:28:39.598620 ignition[865]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:28:39.573410 systemd-networkd[875]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:28:39.601606 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:28:39.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.586758 systemd[1]: Reached target network.target. Dec 13 15:28:39.893773 iscsid[896]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:28:39.893773 iscsid[896]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 15:28:39.893773 iscsid[896]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 15:28:39.893773 iscsid[896]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 15:28:39.893773 iscsid[896]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 15:28:39.893773 iscsid[896]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:28:39.893773 iscsid[896]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 15:28:40.031809 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 15:28:39.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.601675 ignition[865]: parsed url from cmdline: "" Dec 13 15:28:39.611150 unknown[865]: fetched base config from "system" Dec 13 15:28:40.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.601677 ignition[865]: no config URL provided Dec 13 15:28:39.611154 unknown[865]: fetched user config from "system" Dec 13 15:28:39.601680 ignition[865]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:28:39.646125 systemd[1]: Starting iscsiuio.service... Dec 13 15:28:39.601691 ignition[865]: parsing config with SHA512: 66d5bddf0aec9c6e0d5a64e175bfcbfadbfd79ef25a796405a9f7e88b7cd4cf6fe9ebaa3cb7b9571cf55d09c9f32d400e0891419282d99f20810419bb8d8caed Dec 13 15:28:39.651943 systemd[1]: Started iscsiuio.service. Dec 13 15:28:39.611344 ignition[865]: fetch-offline: fetch-offline passed Dec 13 15:28:39.674891 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 15:28:39.611347 ignition[865]: POST message to Packet Timeline Dec 13 15:28:39.733962 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 15:28:39.611351 ignition[865]: POST Status error: resource requires networking Dec 13 15:28:39.734461 systemd[1]: Starting ignition-kargs.service... Dec 13 15:28:39.611393 ignition[865]: Ignition finished successfully Dec 13 15:28:39.808947 systemd-networkd[875]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:28:39.812788 ignition[885]: Ignition 2.14.0 Dec 13 15:28:39.823585 systemd[1]: Starting iscsid.service... Dec 13 15:28:39.812792 ignition[885]: Stage: kargs Dec 13 15:28:39.848749 systemd[1]: Started iscsid.service. Dec 13 15:28:39.812851 ignition[885]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:28:39.869180 systemd[1]: Starting dracut-initqueue.service... Dec 13 15:28:39.812860 ignition[885]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:28:39.886781 systemd[1]: Finished dracut-initqueue.service. Dec 13 15:28:39.814194 ignition[885]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:28:39.901725 systemd[1]: Reached target remote-fs-pre.target. Dec 13 15:28:39.816009 ignition[885]: kargs: kargs passed Dec 13 15:28:39.919747 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:28:39.816018 ignition[885]: POST message to Packet Timeline Dec 13 15:28:39.919790 systemd[1]: Reached target remote-fs.target. Dec 13 15:28:39.816039 ignition[885]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:28:39.980298 systemd[1]: Starting dracut-pre-mount.service... Dec 13 15:28:39.818908 ignition[885]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:32999->[::1]:53: read: connection refused Dec 13 15:28:40.009873 systemd[1]: Finished dracut-pre-mount.service. Dec 13 15:28:40.019326 ignition[885]: GET https://metadata.packet.net/metadata: attempt #2 Dec 13 15:28:40.020138 systemd-networkd[875]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:28:40.019875 ignition[885]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:57127->[::1]:53: read: connection refused Dec 13 15:28:40.048986 systemd-networkd[875]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:28:40.079320 systemd-networkd[875]: enp1s0f1np1: Link UP Dec 13 15:28:40.079563 systemd-networkd[875]: enp1s0f1np1: Gained carrier Dec 13 15:28:40.094101 systemd-networkd[875]: enp1s0f0np0: Link UP Dec 13 15:28:40.094459 systemd-networkd[875]: eno2: Link UP Dec 13 15:28:40.094805 systemd-networkd[875]: eno1: Link UP Dec 13 15:28:40.420501 ignition[885]: GET https://metadata.packet.net/metadata: attempt #3 Dec 13 15:28:40.421658 ignition[885]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:57807->[::1]:53: read: connection refused Dec 13 15:28:40.865475 systemd-networkd[875]: enp1s0f0np0: Gained carrier Dec 13 15:28:40.873715 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Dec 13 15:28:40.894826 systemd-networkd[875]: enp1s0f0np0: DHCPv4 address 147.28.180.167/31, gateway 147.28.180.166 acquired from 145.40.83.140 Dec 13 15:28:41.222202 ignition[885]: GET https://metadata.packet.net/metadata: attempt #4 Dec 13 15:28:41.223350 ignition[885]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:37324->[::1]:53: read: connection refused Dec 13 15:28:41.482228 systemd-networkd[875]: enp1s0f1np1: Gained IPv6LL Dec 13 15:28:41.994242 systemd-networkd[875]: enp1s0f0np0: Gained IPv6LL Dec 13 15:28:42.824765 ignition[885]: GET https://metadata.packet.net/metadata: attempt #5 Dec 13 15:28:42.825896 ignition[885]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:42025->[::1]:53: read: connection refused Dec 13 15:28:46.028662 ignition[885]: GET https://metadata.packet.net/metadata: attempt #6 Dec 13 15:28:47.375502 ignition[885]: GET result: OK Dec 13 15:28:47.711870 ignition[885]: Ignition finished successfully Dec 13 15:28:47.714182 systemd[1]: Finished ignition-kargs.service. Dec 13 15:28:47.803771 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 15:28:47.803803 kernel: audit: type=1130 audit(1734103727.726:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:47.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:47.736359 ignition[915]: Ignition 2.14.0 Dec 13 15:28:47.728899 systemd[1]: Starting ignition-disks.service... Dec 13 15:28:47.736363 ignition[915]: Stage: disks Dec 13 15:28:47.736437 ignition[915]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:28:47.736446 ignition[915]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:28:47.738522 ignition[915]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:28:47.738976 ignition[915]: disks: disks passed Dec 13 15:28:47.738979 ignition[915]: POST message to Packet Timeline Dec 13 15:28:47.738989 ignition[915]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:28:48.601412 ignition[915]: GET result: OK Dec 13 15:28:48.978949 ignition[915]: Ignition finished successfully Dec 13 15:28:48.980485 systemd[1]: Finished ignition-disks.service. Dec 13 15:28:48.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:48.994148 systemd[1]: Reached target initrd-root-device.target. Dec 13 15:28:49.074877 kernel: audit: type=1130 audit(1734103728.993:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:49.060837 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:28:49.060873 systemd[1]: Reached target local-fs.target. Dec 13 15:28:49.083818 systemd[1]: Reached target sysinit.target. Dec 13 15:28:49.098825 systemd[1]: Reached target basic.target. Dec 13 15:28:49.112486 systemd[1]: Starting systemd-fsck-root.service... Dec 13 15:28:49.132909 systemd-fsck[930]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 15:28:49.144924 systemd[1]: Finished systemd-fsck-root.service. Dec 13 15:28:49.239231 kernel: audit: type=1130 audit(1734103729.152:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:49.239246 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 15:28:49.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:49.158322 systemd[1]: Mounting sysroot.mount... Dec 13 15:28:49.246239 systemd[1]: Mounted sysroot.mount. Dec 13 15:28:49.260870 systemd[1]: Reached target initrd-root-fs.target. Dec 13 15:28:49.269548 systemd[1]: Mounting sysroot-usr.mount... Dec 13 15:28:49.290602 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 15:28:49.306243 systemd[1]: Starting flatcar-static-network.service... Dec 13 15:28:49.321770 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 15:28:49.321809 systemd[1]: Reached target ignition-diskful.target. Dec 13 15:28:49.340740 systemd[1]: Mounted sysroot-usr.mount. Dec 13 15:28:49.363590 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 15:28:49.376067 systemd[1]: Starting initrd-setup-root.service... Dec 13 15:28:49.453729 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (943) Dec 13 15:28:49.453755 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:28:49.453773 kernel: BTRFS info (device sdb6): using free space tree Dec 13 15:28:49.453910 initrd-setup-root[948]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 15:28:49.502734 kernel: BTRFS info (device sdb6): has skinny extents Dec 13 15:28:49.502771 kernel: BTRFS info (device sdb6): enabling ssd optimizations Dec 13 15:28:49.502801 initrd-setup-root[973]: cut: /sysroot/etc/group: No such file or directory Dec 13 15:28:49.519699 initrd-setup-root[981]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 15:28:49.511569 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 15:28:49.538778 coreos-metadata[937]: Dec 13 15:28:49.536 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:28:49.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:49.608358 coreos-metadata[938]: Dec 13 15:28:49.536 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:28:49.627669 kernel: audit: type=1130 audit(1734103729.553:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:49.627688 initrd-setup-root[991]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 15:28:49.535848 systemd[1]: Finished initrd-setup-root.service. Dec 13 15:28:49.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:49.554246 systemd[1]: Starting ignition-mount.service... Dec 13 15:28:49.708828 kernel: audit: type=1130 audit(1734103729.645:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:49.615191 systemd[1]: Starting sysroot-boot.service... Dec 13 15:28:49.635488 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 15:28:49.727824 ignition[1015]: INFO : Ignition 2.14.0 Dec 13 15:28:49.727824 ignition[1015]: INFO : Stage: mount Dec 13 15:28:49.727824 ignition[1015]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:28:49.727824 ignition[1015]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:28:49.727824 ignition[1015]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:28:49.727824 ignition[1015]: INFO : mount: mount passed Dec 13 15:28:49.727824 ignition[1015]: INFO : POST message to Packet Timeline Dec 13 15:28:49.727824 ignition[1015]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:28:49.635527 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 15:28:49.636089 systemd[1]: Finished sysroot-boot.service. Dec 13 15:28:50.074528 ignition[1015]: INFO : GET result: OK Dec 13 15:28:50.105873 coreos-metadata[938]: Dec 13 15:28:50.105 INFO Fetch successful Dec 13 15:28:50.132012 systemd[1]: flatcar-static-network.service: Deactivated successfully. Dec 13 15:28:50.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:50.132073 systemd[1]: Finished flatcar-static-network.service. Dec 13 15:28:50.264825 kernel: audit: type=1130 audit(1734103730.141:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:50.264839 kernel: audit: type=1131 audit(1734103730.141:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:50.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:50.315975 coreos-metadata[937]: Dec 13 15:28:50.315 INFO Fetch successful Dec 13 15:28:50.343410 coreos-metadata[937]: Dec 13 15:28:50.343 INFO wrote hostname ci-3510.3.6-a-e598f10d4d to /sysroot/etc/hostname Dec 13 15:28:50.344050 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 15:28:50.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:50.421124 ignition[1015]: INFO : Ignition finished successfully Dec 13 15:28:50.431867 kernel: audit: type=1130 audit(1734103730.365:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:50.421775 systemd[1]: Finished ignition-mount.service. Dec 13 15:28:50.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:50.441265 systemd[1]: Starting ignition-files.service... Dec 13 15:28:50.512801 kernel: audit: type=1130 audit(1734103730.440:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:50.506410 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 15:28:50.569045 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1031) Dec 13 15:28:50.569060 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:28:50.569068 kernel: BTRFS info (device sdb6): using free space tree Dec 13 15:28:50.592210 kernel: BTRFS info (device sdb6): has skinny extents Dec 13 15:28:50.641701 kernel: BTRFS info (device sdb6): enabling ssd optimizations Dec 13 15:28:50.643217 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 15:28:50.660785 ignition[1050]: INFO : Ignition 2.14.0 Dec 13 15:28:50.660785 ignition[1050]: INFO : Stage: files Dec 13 15:28:50.660785 ignition[1050]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:28:50.660785 ignition[1050]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:28:50.660785 ignition[1050]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:28:50.660785 ignition[1050]: DEBUG : files: compiled without relabeling support, skipping Dec 13 15:28:50.660785 ignition[1050]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 15:28:50.660785 ignition[1050]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 15:28:50.782826 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1058) Dec 13 15:28:50.662941 unknown[1050]: wrote ssh authorized keys file for user: core Dec 13 15:28:50.791858 ignition[1050]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 15:28:50.791858 ignition[1050]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 15:28:50.791858 ignition[1050]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 15:28:50.791858 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 15:28:50.791858 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 15:28:50.791858 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:28:50.791858 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:28:50.791858 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 15:28:50.791858 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 15:28:50.791858 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 15:28:50.791858 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 15:28:50.791858 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1803461514" Dec 13 15:28:50.791858 ignition[1050]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1803461514": device or resource busy Dec 13 15:28:50.791858 ignition[1050]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1803461514", trying btrfs: device or resource busy Dec 13 15:28:50.791858 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1803461514" Dec 13 15:28:51.048975 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1803461514" Dec 13 15:28:51.048975 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem1803461514" Dec 13 15:28:51.048975 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem1803461514" Dec 13 15:28:51.048975 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 15:28:51.048975 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 15:28:51.048975 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 15:28:51.184027 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 15:28:51.406605 ignition[1050]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 15:28:51.406605 ignition[1050]: INFO : files: op(b): [started] processing unit "packet-phone-home.service" Dec 13 15:28:51.406605 ignition[1050]: INFO : files: op(b): [finished] processing unit "packet-phone-home.service" Dec 13 15:28:51.406605 ignition[1050]: INFO : files: op(c): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:28:51.406605 ignition[1050]: INFO : files: op(c): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:28:51.406605 ignition[1050]: INFO : files: op(d): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:28:51.486918 ignition[1050]: INFO : files: op(d): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:28:51.486918 ignition[1050]: INFO : files: op(e): [started] setting preset to enabled for "packet-phone-home.service" Dec 13 15:28:51.486918 ignition[1050]: INFO : files: op(e): [finished] setting preset to enabled for "packet-phone-home.service" Dec 13 15:28:51.486918 ignition[1050]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:28:51.486918 ignition[1050]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:28:51.486918 ignition[1050]: INFO : files: files passed Dec 13 15:28:51.486918 ignition[1050]: INFO : POST message to Packet Timeline Dec 13 15:28:51.486918 ignition[1050]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:28:52.427608 ignition[1050]: INFO : GET result: OK Dec 13 15:28:52.933108 ignition[1050]: INFO : Ignition finished successfully Dec 13 15:28:52.936131 systemd[1]: Finished ignition-files.service. Dec 13 15:28:52.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:52.956620 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 15:28:53.028910 kernel: audit: type=1130 audit(1734103732.950:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.017855 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 15:28:53.052961 initrd-setup-root-after-ignition[1082]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 15:28:53.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.120622 kernel: audit: type=1130 audit(1734103733.062:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.018178 systemd[1]: Starting ignition-quench.service... Dec 13 15:28:53.241894 kernel: audit: type=1130 audit(1734103733.128:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.241909 kernel: audit: type=1131 audit(1734103733.128:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.036040 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 15:28:53.063014 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 15:28:53.063080 systemd[1]: Finished ignition-quench.service. Dec 13 15:28:53.391146 kernel: audit: type=1130 audit(1734103733.274:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.391158 kernel: audit: type=1131 audit(1734103733.274:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.128915 systemd[1]: Reached target ignition-complete.target. Dec 13 15:28:53.251203 systemd[1]: Starting initrd-parse-etc.service... Dec 13 15:28:53.264845 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 15:28:53.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.264884 systemd[1]: Finished initrd-parse-etc.service. Dec 13 15:28:53.510829 kernel: audit: type=1130 audit(1734103733.438:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.274965 systemd[1]: Reached target initrd-fs.target. Dec 13 15:28:53.399838 systemd[1]: Reached target initrd.target. Dec 13 15:28:53.399895 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 15:28:53.400243 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 15:28:53.628635 kernel: audit: type=1131 audit(1734103733.567:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.420934 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 15:28:53.439491 systemd[1]: Starting initrd-cleanup.service... Dec 13 15:28:53.505552 systemd[1]: Stopped target nss-lookup.target. Dec 13 15:28:53.519873 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 15:28:53.534930 systemd[1]: Stopped target timers.target. Dec 13 15:28:53.548917 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 15:28:53.549023 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 15:28:53.568065 systemd[1]: Stopped target initrd.target. Dec 13 15:28:53.635931 systemd[1]: Stopped target basic.target. Dec 13 15:28:53.649868 systemd[1]: Stopped target ignition-complete.target. Dec 13 15:28:53.671020 systemd[1]: Stopped target ignition-diskful.target. Dec 13 15:28:53.687900 systemd[1]: Stopped target initrd-root-device.target. Dec 13 15:28:53.704065 systemd[1]: Stopped target remote-fs.target. Dec 13 15:28:53.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.721138 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 15:28:53.902881 kernel: audit: type=1131 audit(1734103733.815:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.737259 systemd[1]: Stopped target sysinit.target. Dec 13 15:28:53.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.752229 systemd[1]: Stopped target local-fs.target. Dec 13 15:28:53.988857 kernel: audit: type=1131 audit(1734103733.911:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.767216 systemd[1]: Stopped target local-fs-pre.target. Dec 13 15:28:53.784212 systemd[1]: Stopped target swap.target. Dec 13 15:28:53.800093 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 15:28:53.800461 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 15:28:53.816444 systemd[1]: Stopped target cryptsetup.target. Dec 13 15:28:53.893887 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 15:28:53.894005 systemd[1]: Stopped dracut-initqueue.service. Dec 13 15:28:54.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.912015 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 15:28:54.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.912138 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 15:28:54.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.981043 systemd[1]: Stopped target paths.target. Dec 13 15:28:54.145750 ignition[1097]: INFO : Ignition 2.14.0 Dec 13 15:28:54.145750 ignition[1097]: INFO : Stage: umount Dec 13 15:28:54.145750 ignition[1097]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:28:54.145750 ignition[1097]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:28:54.145750 ignition[1097]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:28:54.145750 ignition[1097]: INFO : umount: umount passed Dec 13 15:28:54.145750 ignition[1097]: INFO : POST message to Packet Timeline Dec 13 15:28:54.145750 ignition[1097]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:28:54.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:54.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:54.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:54.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:53.995902 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 15:28:53.999857 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 15:28:54.011872 systemd[1]: Stopped target slices.target. Dec 13 15:28:54.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:54.018926 systemd[1]: Stopped target sockets.target. Dec 13 15:28:54.041920 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 15:28:54.041997 systemd[1]: Closed iscsid.socket. Dec 13 15:28:54.056104 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 15:28:54.056214 systemd[1]: Closed iscsiuio.socket. Dec 13 15:28:54.070220 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 15:28:54.070527 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 15:28:54.089317 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 15:28:54.089689 systemd[1]: Stopped ignition-files.service. Dec 13 15:28:54.105307 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 15:28:54.105686 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 15:28:54.126468 systemd[1]: Stopping ignition-mount.service... Dec 13 15:28:54.139230 systemd[1]: Stopping sysroot-boot.service... Dec 13 15:28:54.152810 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 15:28:54.152920 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 15:28:54.167875 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 15:28:54.167972 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 15:28:54.186661 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 15:28:54.188991 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 15:28:54.189107 systemd[1]: Finished initrd-cleanup.service. Dec 13 15:28:54.272045 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 15:28:54.272256 systemd[1]: Stopped sysroot-boot.service. Dec 13 15:28:54.839490 ignition[1097]: INFO : GET result: OK Dec 13 15:28:55.207906 ignition[1097]: INFO : Ignition finished successfully Dec 13 15:28:55.209801 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 15:28:55.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.209985 systemd[1]: Stopped ignition-mount.service. Dec 13 15:28:55.226244 systemd[1]: Stopped target network.target. Dec 13 15:28:55.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.241857 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 15:28:55.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.242013 systemd[1]: Stopped ignition-disks.service. Dec 13 15:28:55.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.256994 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 15:28:55.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.257148 systemd[1]: Stopped ignition-kargs.service. Dec 13 15:28:55.271926 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 15:28:55.272044 systemd[1]: Stopped ignition-setup.service. Dec 13 15:28:55.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.288033 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 15:28:55.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.364000 audit: BPF prog-id=6 op=UNLOAD Dec 13 15:28:55.288170 systemd[1]: Stopped initrd-setup-root.service. Dec 13 15:28:55.303333 systemd[1]: Stopping systemd-networkd.service... Dec 13 15:28:55.308751 systemd-networkd[875]: enp1s0f0np0: DHCPv6 lease lost Dec 13 15:28:55.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.317809 systemd-networkd[875]: enp1s0f1np1: DHCPv6 lease lost Dec 13 15:28:55.421000 audit: BPF prog-id=9 op=UNLOAD Dec 13 15:28:55.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.318050 systemd[1]: Stopping systemd-resolved.service... Dec 13 15:28:55.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.332431 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 15:28:55.332665 systemd[1]: Stopped systemd-resolved.service. Dec 13 15:28:55.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.351231 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 15:28:55.351503 systemd[1]: Stopped systemd-networkd.service. Dec 13 15:28:55.365259 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 15:28:55.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.365338 systemd[1]: Closed systemd-networkd.socket. Dec 13 15:28:55.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.385285 systemd[1]: Stopping network-cleanup.service... Dec 13 15:28:55.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.397840 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 15:28:55.397975 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 15:28:55.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.414041 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 15:28:55.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.414181 systemd[1]: Stopped systemd-sysctl.service. Dec 13 15:28:55.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.430234 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 15:28:55.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.430368 systemd[1]: Stopped systemd-modules-load.service. Dec 13 15:28:55.446194 systemd[1]: Stopping systemd-udevd.service... Dec 13 15:28:55.464163 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 15:28:55.465534 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 15:28:55.465648 systemd[1]: Stopped systemd-udevd.service. Dec 13 15:28:55.477340 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 15:28:55.477371 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 15:28:55.491805 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 15:28:55.491834 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 15:28:55.507721 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 15:28:55.507752 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 15:28:55.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:55.514872 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 15:28:55.514896 systemd[1]: Stopped dracut-cmdline.service. Dec 13 15:28:55.538786 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 15:28:55.538841 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 15:28:55.554112 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 15:28:55.570648 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 15:28:55.823448 iscsid[896]: iscsid shutting down. Dec 13 15:28:55.570678 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 15:28:55.586792 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 15:28:55.586821 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 15:28:55.602703 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 15:28:55.602746 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 15:28:55.823629 systemd-journald[266]: Received SIGTERM from PID 1 (n/a). Dec 13 15:28:55.620574 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 15:28:55.621551 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 15:28:55.621712 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 15:28:55.730090 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 15:28:55.730313 systemd[1]: Stopped network-cleanup.service. Dec 13 15:28:55.739185 systemd[1]: Reached target initrd-switch-root.target. Dec 13 15:28:55.755381 systemd[1]: Starting initrd-switch-root.service... Dec 13 15:28:55.781057 systemd[1]: Switching root. Dec 13 15:28:55.823840 systemd-journald[266]: Journal stopped Dec 13 15:28:59.825419 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 15:28:59.825432 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 15:28:59.825456 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 15:28:59.825462 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 15:28:59.825467 kernel: SELinux: policy capability open_perms=1 Dec 13 15:28:59.825485 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 15:28:59.825492 kernel: SELinux: policy capability always_check_network=0 Dec 13 15:28:59.825497 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 15:28:59.825502 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 15:28:59.825508 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 15:28:59.825514 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 15:28:59.825520 systemd[1]: Successfully loaded SELinux policy in 305.102ms. Dec 13 15:28:59.825527 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.076ms. Dec 13 15:28:59.825534 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:28:59.825542 systemd[1]: Detected architecture x86-64. Dec 13 15:28:59.825548 systemd[1]: Detected first boot. Dec 13 15:28:59.825553 systemd[1]: Hostname set to . Dec 13 15:28:59.825560 systemd[1]: Initializing machine ID from random generator. Dec 13 15:28:59.825566 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 15:28:59.825571 systemd[1]: Populated /etc with preset unit settings. Dec 13 15:28:59.825577 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:28:59.825585 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:28:59.825592 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:28:59.825598 kernel: kauditd_printk_skb: 48 callbacks suppressed Dec 13 15:28:59.825603 kernel: audit: type=1334 audit(1734103738.076:91): prog-id=12 op=LOAD Dec 13 15:28:59.825609 kernel: audit: type=1334 audit(1734103738.076:92): prog-id=3 op=UNLOAD Dec 13 15:28:59.825625 kernel: audit: type=1334 audit(1734103738.121:93): prog-id=13 op=LOAD Dec 13 15:28:59.825632 kernel: audit: type=1334 audit(1734103738.166:94): prog-id=14 op=LOAD Dec 13 15:28:59.825639 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 15:28:59.825645 kernel: audit: type=1334 audit(1734103738.166:95): prog-id=4 op=UNLOAD Dec 13 15:28:59.825651 systemd[1]: Stopped iscsiuio.service. Dec 13 15:28:59.825657 kernel: audit: type=1334 audit(1734103738.166:96): prog-id=5 op=UNLOAD Dec 13 15:28:59.825663 kernel: audit: type=1131 audit(1734103738.167:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:59.825669 kernel: audit: type=1334 audit(1734103738.329:98): prog-id=12 op=UNLOAD Dec 13 15:28:59.825674 kernel: audit: type=1131 audit(1734103738.335:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:59.825680 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 15:28:59.825688 systemd[1]: Stopped iscsid.service. Dec 13 15:28:59.825694 kernel: audit: type=1131 audit(1734103738.445:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:59.825700 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 15:28:59.825720 systemd[1]: Stopped initrd-switch-root.service. Dec 13 15:28:59.825728 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 15:28:59.825734 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 15:28:59.825741 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 15:28:59.825748 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 15:28:59.825754 systemd[1]: Created slice system-getty.slice. Dec 13 15:28:59.825760 systemd[1]: Created slice system-modprobe.slice. Dec 13 15:28:59.825766 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 15:28:59.825773 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 15:28:59.825779 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 15:28:59.825785 systemd[1]: Created slice user.slice. Dec 13 15:28:59.825791 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:28:59.825797 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 15:28:59.825804 systemd[1]: Set up automount boot.automount. Dec 13 15:28:59.825810 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 15:28:59.825817 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 15:28:59.825823 systemd[1]: Stopped target initrd-fs.target. Dec 13 15:28:59.825830 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 15:28:59.825836 systemd[1]: Reached target integritysetup.target. Dec 13 15:28:59.825842 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:28:59.825848 systemd[1]: Reached target remote-fs.target. Dec 13 15:28:59.825855 systemd[1]: Reached target slices.target. Dec 13 15:28:59.825861 systemd[1]: Reached target swap.target. Dec 13 15:28:59.825867 systemd[1]: Reached target torcx.target. Dec 13 15:28:59.825874 systemd[1]: Reached target veritysetup.target. Dec 13 15:28:59.825881 systemd[1]: Listening on systemd-coredump.socket. Dec 13 15:28:59.825888 systemd[1]: Listening on systemd-initctl.socket. Dec 13 15:28:59.825894 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:28:59.825901 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:28:59.825907 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:28:59.825914 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 15:28:59.825920 systemd[1]: Mounting dev-hugepages.mount... Dec 13 15:28:59.825926 systemd[1]: Mounting dev-mqueue.mount... Dec 13 15:28:59.825933 systemd[1]: Mounting media.mount... Dec 13 15:28:59.825940 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:28:59.825946 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 15:28:59.825953 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 15:28:59.825959 systemd[1]: Mounting tmp.mount... Dec 13 15:28:59.825966 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 15:28:59.825972 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:28:59.825979 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:28:59.825985 systemd[1]: Starting modprobe@configfs.service... Dec 13 15:28:59.825991 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:28:59.825999 systemd[1]: Starting modprobe@drm.service... Dec 13 15:28:59.826005 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:28:59.826011 systemd[1]: Starting modprobe@fuse.service... Dec 13 15:28:59.826017 kernel: fuse: init (API version 7.34) Dec 13 15:28:59.826023 systemd[1]: Starting modprobe@loop.service... Dec 13 15:28:59.826029 kernel: loop: module loaded Dec 13 15:28:59.826035 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 15:28:59.826042 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 15:28:59.826048 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 15:28:59.826056 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 15:28:59.826062 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 15:28:59.826068 systemd[1]: Stopped systemd-journald.service. Dec 13 15:28:59.826075 systemd[1]: Starting systemd-journald.service... Dec 13 15:28:59.826081 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:28:59.826089 systemd-journald[1248]: Journal started Dec 13 15:28:59.826114 systemd-journald[1248]: Runtime Journal (/run/log/journal/46526335ed644b00a6b3779abe7d4064) is 8.0M, max 640.1M, 632.1M free. Dec 13 15:28:56.198000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 15:28:56.464000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 15:28:56.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:28:56.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:28:56.467000 audit: BPF prog-id=10 op=LOAD Dec 13 15:28:56.467000 audit: BPF prog-id=10 op=UNLOAD Dec 13 15:28:56.467000 audit: BPF prog-id=11 op=LOAD Dec 13 15:28:56.467000 audit: BPF prog-id=11 op=UNLOAD Dec 13 15:28:56.531000 audit[1139]: AVC avc: denied { associate } for pid=1139 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 15:28:56.531000 audit[1139]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a58e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1122 pid=1139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:56.531000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:28:56.558000 audit[1139]: AVC avc: denied { associate } for pid=1139 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 15:28:56.558000 audit[1139]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a59b9 a2=1ed a3=0 items=2 ppid=1122 pid=1139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:56.558000 audit: CWD cwd="/" Dec 13 15:28:56.558000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:28:56.558000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:28:56.558000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:28:58.076000 audit: BPF prog-id=12 op=LOAD Dec 13 15:28:58.076000 audit: BPF prog-id=3 op=UNLOAD Dec 13 15:28:58.121000 audit: BPF prog-id=13 op=LOAD Dec 13 15:28:58.166000 audit: BPF prog-id=14 op=LOAD Dec 13 15:28:58.166000 audit: BPF prog-id=4 op=UNLOAD Dec 13 15:28:58.166000 audit: BPF prog-id=5 op=UNLOAD Dec 13 15:28:58.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:58.329000 audit: BPF prog-id=12 op=UNLOAD Dec 13 15:28:58.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:58.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:58.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:58.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:59.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:59.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:59.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:59.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:59.797000 audit: BPF prog-id=15 op=LOAD Dec 13 15:28:59.797000 audit: BPF prog-id=16 op=LOAD Dec 13 15:28:59.797000 audit: BPF prog-id=17 op=LOAD Dec 13 15:28:59.797000 audit: BPF prog-id=13 op=UNLOAD Dec 13 15:28:59.797000 audit: BPF prog-id=14 op=UNLOAD Dec 13 15:28:59.822000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 15:28:59.822000 audit[1248]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff3a9cab20 a2=4000 a3=7fff3a9cabbc items=0 ppid=1 pid=1248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:59.822000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 15:28:58.075867 systemd[1]: Queued start job for default target multi-user.target. Dec 13 15:28:56.531334 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:28:58.169330 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 15:28:56.531801 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:28:56.531815 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:28:56.531836 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 15:28:56.531842 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 15:28:56.531860 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 15:28:56.531868 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 15:28:56.531988 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 15:28:56.532013 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:28:56.532021 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:28:56.532550 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 15:28:56.532575 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 15:28:56.532587 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 15:28:56.532597 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 15:28:56.532607 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 15:28:56.532624 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 15:28:57.724501 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:57Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:28:57.724648 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:57Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:28:57.724707 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:57Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:28:57.724801 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:57Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:28:57.724831 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:57Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 15:28:57.724865 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T15:28:57Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 15:28:59.856779 systemd[1]: Starting systemd-network-generator.service... Dec 13 15:28:59.879794 systemd[1]: Starting systemd-remount-fs.service... Dec 13 15:28:59.900663 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:28:59.933146 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 15:28:59.933241 systemd[1]: Stopped verity-setup.service. Dec 13 15:28:59.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:59.967665 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:28:59.981694 systemd[1]: Started systemd-journald.service. Dec 13 15:28:59.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:59.990148 systemd[1]: Mounted dev-hugepages.mount. Dec 13 15:28:59.996869 systemd[1]: Mounted dev-mqueue.mount. Dec 13 15:29:00.003857 systemd[1]: Mounted media.mount. Dec 13 15:29:00.010858 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 15:29:00.019839 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 15:29:00.027841 systemd[1]: Mounted tmp.mount. Dec 13 15:29:00.034926 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 15:29:00.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.042927 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:29:00.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.050961 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 15:29:00.051069 systemd[1]: Finished modprobe@configfs.service. Dec 13 15:29:00.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.060038 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:29:00.060173 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:29:00.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.069238 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:29:00.069437 systemd[1]: Finished modprobe@drm.service. Dec 13 15:29:00.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.078299 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:29:00.078566 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:29:00.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.087461 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 15:29:00.087793 systemd[1]: Finished modprobe@fuse.service. Dec 13 15:29:00.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.096461 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:29:00.096920 systemd[1]: Finished modprobe@loop.service. Dec 13 15:29:00.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.105526 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:29:00.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.114435 systemd[1]: Finished systemd-network-generator.service. Dec 13 15:29:00.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.123436 systemd[1]: Finished systemd-remount-fs.service. Dec 13 15:29:00.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.132436 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:29:00.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.141981 systemd[1]: Reached target network-pre.target. Dec 13 15:29:00.153324 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 15:29:00.162293 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 15:29:00.169802 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 15:29:00.171288 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 15:29:00.179241 systemd[1]: Starting systemd-journal-flush.service... Dec 13 15:29:00.182660 systemd-journald[1248]: Time spent on flushing to /var/log/journal/46526335ed644b00a6b3779abe7d4064 is 14.369ms for 1569 entries. Dec 13 15:29:00.182660 systemd-journald[1248]: System Journal (/var/log/journal/46526335ed644b00a6b3779abe7d4064) is 8.0M, max 195.6M, 187.6M free. Dec 13 15:29:00.217224 systemd-journald[1248]: Received client request to flush runtime journal. Dec 13 15:29:00.197681 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:29:00.198221 systemd[1]: Starting systemd-random-seed.service... Dec 13 15:29:00.206737 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:29:00.207222 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:29:00.215410 systemd[1]: Starting systemd-sysusers.service... Dec 13 15:29:00.223230 systemd[1]: Starting systemd-udev-settle.service... Dec 13 15:29:00.230845 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 15:29:00.238787 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 15:29:00.246847 systemd[1]: Finished systemd-journal-flush.service. Dec 13 15:29:00.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.254852 systemd[1]: Finished systemd-random-seed.service. Dec 13 15:29:00.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.262860 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:29:00.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.270807 systemd[1]: Finished systemd-sysusers.service. Dec 13 15:29:00.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.279790 systemd[1]: Reached target first-boot-complete.target. Dec 13 15:29:00.288346 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:29:00.297805 udevadm[1264]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 15:29:00.308394 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:29:00.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.473199 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 15:29:00.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.482000 audit: BPF prog-id=18 op=LOAD Dec 13 15:29:00.482000 audit: BPF prog-id=19 op=LOAD Dec 13 15:29:00.482000 audit: BPF prog-id=7 op=UNLOAD Dec 13 15:29:00.482000 audit: BPF prog-id=8 op=UNLOAD Dec 13 15:29:00.483906 systemd[1]: Starting systemd-udevd.service... Dec 13 15:29:00.495175 systemd-udevd[1268]: Using default interface naming scheme 'v252'. Dec 13 15:29:00.511462 systemd[1]: Started systemd-udevd.service. Dec 13 15:29:00.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.521899 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Dec 13 15:29:00.521000 audit: BPF prog-id=20 op=LOAD Dec 13 15:29:00.523392 systemd[1]: Starting systemd-networkd.service... Dec 13 15:29:00.540000 audit: BPF prog-id=21 op=LOAD Dec 13 15:29:00.554863 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Dec 13 15:29:00.555023 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 15:29:00.553000 audit: BPF prog-id=22 op=LOAD Dec 13 15:29:00.553000 audit: BPF prog-id=23 op=LOAD Dec 13 15:29:00.555824 systemd[1]: Starting systemd-userdbd.service... Dec 13 15:29:00.571820 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 15:29:00.571860 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1272) Dec 13 15:29:00.592644 kernel: ACPI: button: Power Button [PWRF] Dec 13 15:29:00.606860 kernel: IPMI message handler: version 39.2 Dec 13 15:29:00.622622 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 15:29:00.625410 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:29:00.551000 audit[1334]: AVC avc: denied { confidentiality } for pid=1334 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 15:29:00.551000 audit[1334]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7eff3d66a010 a1=4d98c a2=7eff3f325bc5 a3=5 items=42 ppid=1268 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:00.551000 audit: CWD cwd="/" Dec 13 15:29:00.551000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=1 name=(null) inode=22929 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=2 name=(null) inode=22929 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=3 name=(null) inode=22930 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=4 name=(null) inode=22929 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=5 name=(null) inode=22931 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=6 name=(null) inode=22929 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=7 name=(null) inode=22932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=8 name=(null) inode=22932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=9 name=(null) inode=22933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=10 name=(null) inode=22932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=11 name=(null) inode=22934 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=12 name=(null) inode=22932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=13 name=(null) inode=22935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=14 name=(null) inode=22932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=15 name=(null) inode=22936 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=16 name=(null) inode=22932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=17 name=(null) inode=22937 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=18 name=(null) inode=22929 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=19 name=(null) inode=22938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=20 name=(null) inode=22938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=21 name=(null) inode=22939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=22 name=(null) inode=22938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=23 name=(null) inode=22940 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=24 name=(null) inode=22938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=25 name=(null) inode=22941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=26 name=(null) inode=22938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=27 name=(null) inode=22942 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=28 name=(null) inode=22938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=29 name=(null) inode=22943 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=30 name=(null) inode=22929 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=31 name=(null) inode=22944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=32 name=(null) inode=22944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=33 name=(null) inode=22945 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=34 name=(null) inode=22944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=35 name=(null) inode=22946 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=36 name=(null) inode=22944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=37 name=(null) inode=22947 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=38 name=(null) inode=22944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=39 name=(null) inode=22948 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=40 name=(null) inode=22944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PATH item=41 name=(null) inode=22949 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:00.551000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 15:29:00.658371 systemd[1]: Started systemd-userdbd.service. Dec 13 15:29:00.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:00.674628 kernel: ipmi device interface Dec 13 15:29:00.711672 kernel: ipmi_si: IPMI System Interface driver Dec 13 15:29:00.711755 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Dec 13 15:29:00.745032 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Dec 13 15:29:00.745048 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Dec 13 15:29:00.745059 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Dec 13 15:29:00.828672 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Dec 13 15:29:00.913179 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Dec 13 15:29:00.913282 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Dec 13 15:29:00.913358 kernel: i2c i2c-0: 1/4 memory slots populated (from DMI) Dec 13 15:29:00.913420 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Dec 13 15:29:00.913488 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Dec 13 15:29:00.913555 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Dec 13 15:29:00.913625 kernel: ipmi_si: Adding ACPI-specified kcs state machine Dec 13 15:29:00.913639 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Dec 13 15:29:00.913648 kernel: iTCO_vendor_support: vendor-support=0 Dec 13 15:29:01.007563 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Dec 13 15:29:01.025953 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Dec 13 15:29:01.026037 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Dec 13 15:29:01.026105 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Dec 13 15:29:01.053423 systemd-networkd[1306]: bond0: netdev ready Dec 13 15:29:01.056150 systemd-networkd[1306]: lo: Link UP Dec 13 15:29:01.056153 systemd-networkd[1306]: lo: Gained carrier Dec 13 15:29:01.056636 systemd-networkd[1306]: Enumeration completed Dec 13 15:29:01.056712 systemd[1]: Started systemd-networkd.service. Dec 13 15:29:01.056921 systemd-networkd[1306]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Dec 13 15:29:01.062753 systemd-networkd[1306]: enp1s0f1np1: Configuring with /etc/systemd/network/10-b8:59:9f:de:84:d5.network. Dec 13 15:29:01.072631 kernel: intel_rapl_common: Found RAPL domain package Dec 13 15:29:01.072690 kernel: intel_rapl_common: Found RAPL domain core Dec 13 15:29:01.072717 kernel: intel_rapl_common: Found RAPL domain dram Dec 13 15:29:01.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.188622 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Dec 13 15:29:01.206658 kernel: ipmi_ssif: IPMI SSIF Interface driver Dec 13 15:29:01.209893 systemd[1]: Finished systemd-udev-settle.service. Dec 13 15:29:01.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.218351 systemd[1]: Starting lvm2-activation-early.service... Dec 13 15:29:01.234898 lvm[1374]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:29:01.266982 systemd[1]: Finished lvm2-activation-early.service. Dec 13 15:29:01.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.274732 systemd[1]: Reached target cryptsetup.target. Dec 13 15:29:01.283231 systemd[1]: Starting lvm2-activation.service... Dec 13 15:29:01.285419 lvm[1375]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:29:01.308022 systemd[1]: Finished lvm2-activation.service. Dec 13 15:29:01.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.315693 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:29:01.324655 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 15:29:01.324669 systemd[1]: Reached target local-fs.target. Dec 13 15:29:01.333655 systemd[1]: Reached target machines.target. Dec 13 15:29:01.343271 systemd[1]: Starting ldconfig.service... Dec 13 15:29:01.350461 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:29:01.350482 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:29:01.351011 systemd[1]: Starting systemd-boot-update.service... Dec 13 15:29:01.358176 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 15:29:01.368210 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 15:29:01.368878 systemd[1]: Starting systemd-sysext.service... Dec 13 15:29:01.369078 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1377 (bootctl) Dec 13 15:29:01.369743 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 15:29:01.380035 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 15:29:01.390468 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 15:29:01.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.390639 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 15:29:01.390727 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 15:29:01.424664 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 15:29:01.499662 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 15:29:01.500026 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 15:29:01.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.534649 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 15:29:01.553241 systemd-fsck[1386]: fsck.fat 4.2 (2021-01-31) Dec 13 15:29:01.553241 systemd-fsck[1386]: /dev/sdb1: 789 files, 119291/258078 clusters Dec 13 15:29:01.554019 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 15:29:01.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.568768 systemd[1]: Mounting boot.mount... Dec 13 15:29:01.580657 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 15:29:01.597693 systemd[1]: Mounted boot.mount. Dec 13 15:29:01.610788 (sd-sysext)[1390]: Using extensions 'kubernetes'. Dec 13 15:29:01.611894 (sd-sysext)[1390]: Merged extensions into '/usr'. Dec 13 15:29:01.626005 systemd[1]: Finished systemd-boot-update.service. Dec 13 15:29:01.647676 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 15:29:01.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.674636 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Dec 13 15:29:01.675773 systemd-networkd[1306]: enp1s0f0np0: Configuring with /etc/systemd/network/10-b8:59:9f:de:84:d4.network. Dec 13 15:29:01.678330 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:29:01.680123 systemd[1]: Mounting usr-share-oem.mount... Dec 13 15:29:01.697041 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:29:01.698756 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:29:01.705662 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 15:29:01.713229 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:29:01.721232 systemd[1]: Starting modprobe@loop.service... Dec 13 15:29:01.728737 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:29:01.728798 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:29:01.728863 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:29:01.730471 systemd[1]: Mounted usr-share-oem.mount. Dec 13 15:29:01.738827 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:29:01.738890 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:29:01.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.748878 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:29:01.749168 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:29:01.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.758760 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:29:01.759069 systemd[1]: Finished modprobe@loop.service. Dec 13 15:29:01.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.769270 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:29:01.769489 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:29:01.771828 systemd[1]: Finished systemd-sysext.service. Dec 13 15:29:01.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.782785 systemd[1]: Starting ensure-sysext.service... Dec 13 15:29:01.796992 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 15:29:01.811539 systemd[1]: Reloading. Dec 13 15:29:01.819907 systemd-tmpfiles[1398]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 15:29:01.821270 systemd-tmpfiles[1398]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 15:29:01.824220 systemd-tmpfiles[1398]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 15:29:01.831658 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 15:29:01.831696 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 15:29:01.846775 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T15:29:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:29:01.846792 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T15:29:01Z" level=info msg="torcx already run" Dec 13 15:29:01.854528 ldconfig[1376]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 15:29:01.871669 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Dec 13 15:29:01.871724 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Dec 13 15:29:01.891394 systemd-networkd[1306]: bond0: Link UP Dec 13 15:29:01.891589 systemd-networkd[1306]: enp1s0f1np1: Link UP Dec 13 15:29:01.891774 systemd-networkd[1306]: enp1s0f1np1: Gained carrier Dec 13 15:29:01.892763 systemd-networkd[1306]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-b8:59:9f:de:84:d4.network. Dec 13 15:29:01.911575 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:29:01.911582 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:29:01.922551 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:29:01.933861 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Dec 13 15:29:01.933885 kernel: bond0: active interface up! Dec 13 15:29:01.958619 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 15:29:01.962000 audit: BPF prog-id=24 op=LOAD Dec 13 15:29:01.962000 audit: BPF prog-id=25 op=LOAD Dec 13 15:29:01.962000 audit: BPF prog-id=18 op=UNLOAD Dec 13 15:29:01.962000 audit: BPF prog-id=19 op=UNLOAD Dec 13 15:29:01.963000 audit: BPF prog-id=26 op=LOAD Dec 13 15:29:01.963000 audit: BPF prog-id=15 op=UNLOAD Dec 13 15:29:01.963000 audit: BPF prog-id=27 op=LOAD Dec 13 15:29:01.963000 audit: BPF prog-id=28 op=LOAD Dec 13 15:29:01.963000 audit: BPF prog-id=16 op=UNLOAD Dec 13 15:29:01.963000 audit: BPF prog-id=17 op=UNLOAD Dec 13 15:29:01.963000 audit: BPF prog-id=29 op=LOAD Dec 13 15:29:01.963000 audit: BPF prog-id=20 op=UNLOAD Dec 13 15:29:01.964000 audit: BPF prog-id=30 op=LOAD Dec 13 15:29:01.964000 audit: BPF prog-id=21 op=UNLOAD Dec 13 15:29:01.964000 audit: BPF prog-id=31 op=LOAD Dec 13 15:29:01.964000 audit: BPF prog-id=32 op=LOAD Dec 13 15:29:01.964000 audit: BPF prog-id=22 op=UNLOAD Dec 13 15:29:01.964000 audit: BPF prog-id=23 op=UNLOAD Dec 13 15:29:01.967937 systemd[1]: Finished ldconfig.service. Dec 13 15:29:01.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.975257 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 15:29:01.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:01.986055 systemd[1]: Starting audit-rules.service... Dec 13 15:29:01.993295 systemd[1]: Starting clean-ca-certificates.service... Dec 13 15:29:02.002361 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 15:29:02.001000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 15:29:02.001000 audit[1495]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff50d874b0 a2=420 a3=0 items=0 ppid=1479 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:02.001000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 15:29:02.003559 augenrules[1495]: No rules Dec 13 15:29:02.011741 systemd[1]: Starting systemd-resolved.service... Dec 13 15:29:02.015722 systemd-networkd[1306]: enp1s0f0np0: Link UP Dec 13 15:29:02.015882 systemd-networkd[1306]: bond0: Gained carrier Dec 13 15:29:02.015968 systemd-networkd[1306]: enp1s0f0np0: Gained carrier Dec 13 15:29:02.019690 systemd[1]: Starting systemd-timesyncd.service... Dec 13 15:29:02.028313 systemd[1]: Starting systemd-update-utmp.service... Dec 13 15:29:02.029888 systemd-networkd[1306]: enp1s0f1np1: Link DOWN Dec 13 15:29:02.029891 systemd-networkd[1306]: enp1s0f1np1: Lost carrier Dec 13 15:29:02.036304 systemd[1]: Finished audit-rules.service. Dec 13 15:29:02.050778 systemd[1]: Finished clean-ca-certificates.service. Dec 13 15:29:02.062619 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:29:02.078884 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 15:29:02.085620 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:29:02.085638 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 15:29:02.125620 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:29:02.126446 systemd[1]: Finished systemd-update-utmp.service. Dec 13 15:29:02.144296 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:29:02.144971 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:29:02.147649 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:29:02.163278 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:29:02.169649 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:29:02.185234 systemd[1]: Starting modprobe@loop.service... Dec 13 15:29:02.191620 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:29:02.206711 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:29:02.206783 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:29:02.207438 systemd[1]: Starting systemd-update-done.service... Dec 13 15:29:02.213619 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:29:02.213639 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 15:29:02.229621 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:29:02.232732 systemd-networkd[1306]: enp1s0f1np1: Link UP Dec 13 15:29:02.232898 systemd-networkd[1306]: enp1s0f1np1: Gained carrier Dec 13 15:29:02.235652 systemd-resolved[1501]: Positive Trust Anchors: Dec 13 15:29:02.235659 systemd-resolved[1501]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:29:02.235688 systemd-resolved[1501]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:29:02.239374 systemd-resolved[1501]: Using system hostname 'ci-3510.3.6-a-e598f10d4d'. Dec 13 15:29:02.248672 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Dec 13 15:29:02.280665 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:29:02.281204 systemd[1]: Started systemd-timesyncd.service. Dec 13 15:29:02.283640 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 25000 Mbps full duplex Dec 13 15:29:02.292831 systemd[1]: Started systemd-resolved.service. Dec 13 15:29:02.301835 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:29:02.301908 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:29:02.310841 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:29:02.310903 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:29:02.318865 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:29:02.318926 systemd[1]: Finished modprobe@loop.service. Dec 13 15:29:02.327838 systemd[1]: Finished systemd-update-done.service. Dec 13 15:29:02.336868 systemd[1]: Reached target network.target. Dec 13 15:29:02.345696 systemd[1]: Reached target nss-lookup.target. Dec 13 15:29:02.354695 systemd[1]: Reached target time-set.target. Dec 13 15:29:02.363682 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:29:02.363756 systemd[1]: Reached target sysinit.target. Dec 13 15:29:02.371744 systemd[1]: Started motdgen.path. Dec 13 15:29:02.378712 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 15:29:02.393826 systemd[1]: Started logrotate.timer. Dec 13 15:29:02.404656 kernel: bond0: (slave enp1s0f1np1): link status up again after 100 ms Dec 13 15:29:02.419801 systemd[1]: Started mdadm.timer. Dec 13 15:29:02.424621 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Dec 13 15:29:02.430708 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 15:29:02.438677 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 15:29:02.438732 systemd[1]: Reached target paths.target. Dec 13 15:29:02.445689 systemd[1]: Reached target timers.target. Dec 13 15:29:02.453883 systemd[1]: Listening on dbus.socket. Dec 13 15:29:02.462302 systemd[1]: Starting docker.socket... Dec 13 15:29:02.471174 systemd[1]: Listening on sshd.socket. Dec 13 15:29:02.478768 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:29:02.478836 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:29:02.480500 systemd[1]: Listening on docker.socket. Dec 13 15:29:02.489555 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 15:29:02.489641 systemd[1]: Reached target sockets.target. Dec 13 15:29:02.498746 systemd[1]: Reached target basic.target. Dec 13 15:29:02.506678 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:29:02.506727 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:29:02.506777 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:29:02.507326 systemd[1]: Starting containerd.service... Dec 13 15:29:02.515139 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 15:29:02.524221 systemd[1]: Starting coreos-metadata.service... Dec 13 15:29:02.532241 systemd[1]: Starting dbus.service... Dec 13 15:29:02.539222 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 15:29:02.543247 jq[1519]: false Dec 13 15:29:02.543500 coreos-metadata[1512]: Dec 13 15:29:02.543 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:29:02.547273 systemd[1]: Starting extend-filesystems.service... Dec 13 15:29:02.549003 dbus-daemon[1518]: [system] SELinux support is enabled Dec 13 15:29:02.553214 coreos-metadata[1515]: Dec 13 15:29:02.553 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:29:02.553732 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 15:29:02.554467 systemd[1]: Starting modprobe@drm.service... Dec 13 15:29:02.555206 extend-filesystems[1521]: Found loop1 Dec 13 15:29:02.576741 extend-filesystems[1521]: Found sda Dec 13 15:29:02.576741 extend-filesystems[1521]: Found sdb Dec 13 15:29:02.576741 extend-filesystems[1521]: Found sdb1 Dec 13 15:29:02.576741 extend-filesystems[1521]: Found sdb2 Dec 13 15:29:02.576741 extend-filesystems[1521]: Found sdb3 Dec 13 15:29:02.576741 extend-filesystems[1521]: Found usr Dec 13 15:29:02.576741 extend-filesystems[1521]: Found sdb4 Dec 13 15:29:02.576741 extend-filesystems[1521]: Found sdb6 Dec 13 15:29:02.576741 extend-filesystems[1521]: Found sdb7 Dec 13 15:29:02.576741 extend-filesystems[1521]: Found sdb9 Dec 13 15:29:02.576741 extend-filesystems[1521]: Checking size of /dev/sdb9 Dec 13 15:29:02.576741 extend-filesystems[1521]: Resized partition /dev/sdb9 Dec 13 15:29:02.688701 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Dec 13 15:29:02.563460 systemd[1]: Starting motdgen.service... Dec 13 15:29:02.688803 extend-filesystems[1530]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 15:29:02.595520 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 15:29:02.603363 systemd[1]: Starting sshd-keygen.service... Dec 13 15:29:02.626304 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 15:29:02.651698 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:29:02.652391 systemd[1]: Starting tcsd.service... Dec 13 15:29:02.711124 update_engine[1549]: I1213 15:29:02.705673 1549 main.cc:92] Flatcar Update Engine starting Dec 13 15:29:02.711124 update_engine[1549]: I1213 15:29:02.709026 1549 update_check_scheduler.cc:74] Next update check in 4m39s Dec 13 15:29:02.659068 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 15:29:02.711279 jq[1550]: true Dec 13 15:29:02.659451 systemd[1]: Starting update-engine.service... Dec 13 15:29:02.681320 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 15:29:02.702710 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:29:02.703815 systemd[1]: Started dbus.service. Dec 13 15:29:02.719553 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 15:29:02.719662 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 15:29:02.719941 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:29:02.720028 systemd[1]: Finished modprobe@drm.service. Dec 13 15:29:02.727905 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 15:29:02.728005 systemd[1]: Finished motdgen.service. Dec 13 15:29:02.734922 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 15:29:02.735019 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 15:29:02.745356 jq[1552]: true Dec 13 15:29:02.746054 systemd[1]: Finished ensure-sysext.service. Dec 13 15:29:02.754805 env[1553]: time="2024-12-13T15:29:02.754768441Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 15:29:02.759845 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Dec 13 15:29:02.759935 systemd[1]: Condition check resulted in tcsd.service being skipped. Dec 13 15:29:02.762921 systemd[1]: Started update-engine.service. Dec 13 15:29:02.763520 env[1553]: time="2024-12-13T15:29:02.763348973Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 15:29:02.763902 env[1553]: time="2024-12-13T15:29:02.763865666Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:29:02.764509 env[1553]: time="2024-12-13T15:29:02.764469126Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:29:02.764509 env[1553]: time="2024-12-13T15:29:02.764483953Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:29:02.764602 env[1553]: time="2024-12-13T15:29:02.764592249Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:29:02.764640 env[1553]: time="2024-12-13T15:29:02.764602590Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 15:29:02.764640 env[1553]: time="2024-12-13T15:29:02.764609785Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 15:29:02.764640 env[1553]: time="2024-12-13T15:29:02.764618596Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 15:29:02.764696 env[1553]: time="2024-12-13T15:29:02.764662070Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:29:02.764816 env[1553]: time="2024-12-13T15:29:02.764780324Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:29:02.764863 env[1553]: time="2024-12-13T15:29:02.764849531Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:29:02.764863 env[1553]: time="2024-12-13T15:29:02.764860389Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 15:29:02.764905 env[1553]: time="2024-12-13T15:29:02.764885268Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 15:29:02.764905 env[1553]: time="2024-12-13T15:29:02.764893977Z" level=info msg="metadata content store policy set" policy=shared Dec 13 15:29:02.774433 systemd[1]: Started locksmithd.service. Dec 13 15:29:02.778829 env[1553]: time="2024-12-13T15:29:02.778813804Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 15:29:02.778862 env[1553]: time="2024-12-13T15:29:02.778836730Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 15:29:02.778862 env[1553]: time="2024-12-13T15:29:02.778849578Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 15:29:02.778895 env[1553]: time="2024-12-13T15:29:02.778876415Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 15:29:02.778895 env[1553]: time="2024-12-13T15:29:02.778890628Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 15:29:02.780982 env[1553]: time="2024-12-13T15:29:02.778901689Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 15:29:02.780982 env[1553]: time="2024-12-13T15:29:02.778909188Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 15:29:02.780982 env[1553]: time="2024-12-13T15:29:02.778916573Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 15:29:02.780982 env[1553]: time="2024-12-13T15:29:02.778923486Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 15:29:02.780982 env[1553]: time="2024-12-13T15:29:02.778930486Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 15:29:02.780982 env[1553]: time="2024-12-13T15:29:02.778937106Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 15:29:02.780982 env[1553]: time="2024-12-13T15:29:02.778943732Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 15:29:02.780687 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 15:29:02.781117 env[1553]: time="2024-12-13T15:29:02.780983609Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 15:29:02.781117 env[1553]: time="2024-12-13T15:29:02.781033863Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 15:29:02.780701 systemd[1]: Reached target system-config.target. Dec 13 15:29:02.781191 env[1553]: time="2024-12-13T15:29:02.781178435Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 15:29:02.781215 env[1553]: time="2024-12-13T15:29:02.781194252Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781215 env[1553]: time="2024-12-13T15:29:02.781202053Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 15:29:02.781245 env[1553]: time="2024-12-13T15:29:02.781229541Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781245 env[1553]: time="2024-12-13T15:29:02.781237364Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781277 env[1553]: time="2024-12-13T15:29:02.781244090Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781277 env[1553]: time="2024-12-13T15:29:02.781251885Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781277 env[1553]: time="2024-12-13T15:29:02.781258665Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781277 env[1553]: time="2024-12-13T15:29:02.781265225Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781277 env[1553]: time="2024-12-13T15:29:02.781271566Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781354 env[1553]: time="2024-12-13T15:29:02.781277728Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781354 env[1553]: time="2024-12-13T15:29:02.781285512Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 15:29:02.781354 env[1553]: time="2024-12-13T15:29:02.781349510Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781407 env[1553]: time="2024-12-13T15:29:02.781358608Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781407 env[1553]: time="2024-12-13T15:29:02.781365797Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781407 env[1553]: time="2024-12-13T15:29:02.781371986Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 15:29:02.781407 env[1553]: time="2024-12-13T15:29:02.781379354Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 15:29:02.781407 env[1553]: time="2024-12-13T15:29:02.781385235Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 15:29:02.781407 env[1553]: time="2024-12-13T15:29:02.781394902Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 15:29:02.781492 env[1553]: time="2024-12-13T15:29:02.781415657Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 15:29:02.781595 env[1553]: time="2024-12-13T15:29:02.781554156Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.781610130Z" level=info msg="Connect containerd service" Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.781642555Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.781908887Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.781994986Z" level=info msg="Start subscribing containerd event" Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.782023056Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.782024326Z" level=info msg="Start recovering state" Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.782047518Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.782062422Z" level=info msg="Start event monitor" Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.782070862Z" level=info msg="containerd successfully booted in 0.027791s" Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.782071924Z" level=info msg="Start snapshots syncer" Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.782082229Z" level=info msg="Start cni network conf syncer for default" Dec 13 15:29:02.783891 env[1553]: time="2024-12-13T15:29:02.782087799Z" level=info msg="Start streaming server" Dec 13 15:29:02.786847 bash[1585]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:29:02.790066 systemd[1]: Starting systemd-logind.service... Dec 13 15:29:02.796712 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 15:29:02.796733 systemd[1]: Reached target user-config.target. Dec 13 15:29:02.804792 systemd[1]: Started containerd.service. Dec 13 15:29:02.811881 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 15:29:02.812610 systemd-logind[1594]: Watching system buttons on /dev/input/event3 (Power Button) Dec 13 15:29:02.812626 systemd-logind[1594]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 15:29:02.812636 systemd-logind[1594]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Dec 13 15:29:02.812738 systemd-logind[1594]: New seat seat0. Dec 13 15:29:02.821929 systemd[1]: Started systemd-logind.service. Dec 13 15:29:02.835047 locksmithd[1589]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 15:29:02.865766 sshd_keygen[1546]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 15:29:02.877369 systemd[1]: Finished sshd-keygen.service. Dec 13 15:29:02.884546 systemd[1]: Starting issuegen.service... Dec 13 15:29:02.891887 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 15:29:02.891964 systemd[1]: Finished issuegen.service. Dec 13 15:29:02.900450 systemd[1]: Starting systemd-user-sessions.service... Dec 13 15:29:02.908898 systemd[1]: Finished systemd-user-sessions.service. Dec 13 15:29:02.917374 systemd[1]: Started getty@tty1.service. Dec 13 15:29:02.924353 systemd[1]: Started serial-getty@ttyS1.service. Dec 13 15:29:02.932810 systemd[1]: Reached target getty.target. Dec 13 15:29:03.050685 systemd-networkd[1306]: bond0: Gained IPv6LL Dec 13 15:29:03.072657 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Dec 13 15:29:03.100712 extend-filesystems[1530]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Dec 13 15:29:03.100712 extend-filesystems[1530]: old_desc_blocks = 1, new_desc_blocks = 56 Dec 13 15:29:03.100712 extend-filesystems[1530]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Dec 13 15:29:03.140789 extend-filesystems[1521]: Resized filesystem in /dev/sdb9 Dec 13 15:29:03.101093 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 15:29:03.101195 systemd[1]: Finished extend-filesystems.service. Dec 13 15:29:03.947146 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 15:29:03.956976 systemd[1]: Reached target network-online.target. Dec 13 15:29:03.965856 systemd[1]: Starting kubelet.service... Dec 13 15:29:04.532700 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Dec 13 15:29:04.672744 systemd[1]: Started kubelet.service. Dec 13 15:29:05.123805 kubelet[1625]: E1213 15:29:05.123713 1625 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:29:05.124716 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:29:05.124783 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:29:07.948308 login[1614]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 15:29:07.954090 login[1613]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 15:29:07.955910 systemd-logind[1594]: New session 1 of user core. Dec 13 15:29:07.956415 systemd[1]: Created slice user-500.slice. Dec 13 15:29:07.956994 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 15:29:07.958253 systemd-logind[1594]: New session 2 of user core. Dec 13 15:29:07.962183 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 15:29:07.962899 systemd[1]: Starting user@500.service... Dec 13 15:29:07.964874 (systemd)[1643]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:08.033004 systemd[1643]: Queued start job for default target default.target. Dec 13 15:29:08.033241 systemd[1643]: Reached target paths.target. Dec 13 15:29:08.033252 systemd[1643]: Reached target sockets.target. Dec 13 15:29:08.033260 systemd[1643]: Reached target timers.target. Dec 13 15:29:08.033267 systemd[1643]: Reached target basic.target. Dec 13 15:29:08.033286 systemd[1643]: Reached target default.target. Dec 13 15:29:08.033301 systemd[1643]: Startup finished in 65ms. Dec 13 15:29:08.033352 systemd[1]: Started user@500.service. Dec 13 15:29:08.033928 systemd[1]: Started session-1.scope. Dec 13 15:29:08.034290 systemd[1]: Started session-2.scope. Dec 13 15:29:08.363056 coreos-metadata[1512]: Dec 13 15:29:08.362 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 15:29:08.363839 coreos-metadata[1515]: Dec 13 15:29:08.362 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 15:29:09.363308 coreos-metadata[1512]: Dec 13 15:29:09.363 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 15:29:09.364109 coreos-metadata[1515]: Dec 13 15:29:09.363 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 15:29:10.024626 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Dec 13 15:29:10.024803 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Dec 13 15:29:10.511276 systemd[1]: Created slice system-sshd.slice. Dec 13 15:29:10.511906 systemd[1]: Started sshd@0-147.28.180.167:22-139.178.89.65:49188.service. Dec 13 15:29:10.560066 sshd[1664]: Accepted publickey for core from 139.178.89.65 port 49188 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:29:10.561332 sshd[1664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:10.566031 systemd-logind[1594]: New session 3 of user core. Dec 13 15:29:10.567037 systemd[1]: Started session-3.scope. Dec 13 15:29:10.625332 systemd-timesyncd[1502]: Contacted time server 67.217.246.204:123 (0.flatcar.pool.ntp.org). Dec 13 15:29:10.625360 systemd-timesyncd[1502]: Initial clock synchronization to Fri 2024-12-13 15:29:11.006547 UTC. Dec 13 15:29:10.626377 systemd[1]: Started sshd@1-147.28.180.167:22-139.178.89.65:54262.service. Dec 13 15:29:10.663124 sshd[1669]: Accepted publickey for core from 139.178.89.65 port 54262 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:29:10.663807 sshd[1669]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:10.666026 systemd-logind[1594]: New session 4 of user core. Dec 13 15:29:10.666430 systemd[1]: Started session-4.scope. Dec 13 15:29:10.719349 sshd[1669]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:10.721039 systemd[1]: sshd@1-147.28.180.167:22-139.178.89.65:54262.service: Deactivated successfully. Dec 13 15:29:10.721366 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 15:29:10.721642 systemd-logind[1594]: Session 4 logged out. Waiting for processes to exit. Dec 13 15:29:10.722187 systemd[1]: Started sshd@2-147.28.180.167:22-139.178.89.65:54266.service. Dec 13 15:29:10.722581 systemd-logind[1594]: Removed session 4. Dec 13 15:29:10.759040 sshd[1675]: Accepted publickey for core from 139.178.89.65 port 54266 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:29:10.759976 sshd[1675]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:10.763354 systemd-logind[1594]: New session 5 of user core. Dec 13 15:29:10.764218 systemd[1]: Started session-5.scope. Dec 13 15:29:10.820434 sshd[1675]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:10.821759 systemd[1]: sshd@2-147.28.180.167:22-139.178.89.65:54266.service: Deactivated successfully. Dec 13 15:29:10.822142 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 15:29:10.822500 systemd-logind[1594]: Session 5 logged out. Waiting for processes to exit. Dec 13 15:29:10.823154 systemd-logind[1594]: Removed session 5. Dec 13 15:29:10.958226 coreos-metadata[1515]: Dec 13 15:29:10.958 INFO Fetch successful Dec 13 15:29:11.037934 systemd[1]: Finished coreos-metadata.service. Dec 13 15:29:11.038834 systemd[1]: Started packet-phone-home.service. Dec 13 15:29:11.065924 curl[1682]: % Total % Received % Xferd Average Speed Time Time Time Current Dec 13 15:29:11.066472 curl[1682]: Dload Upload Total Spent Left Speed Dec 13 15:29:11.257379 coreos-metadata[1512]: Dec 13 15:29:11.257 INFO Fetch successful Dec 13 15:29:11.341033 unknown[1512]: wrote ssh authorized keys file for user: core Dec 13 15:29:11.353289 update-ssh-keys[1683]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:29:11.353530 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 15:29:11.353832 systemd[1]: Reached target multi-user.target. Dec 13 15:29:11.354542 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 15:29:11.358979 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 15:29:11.359053 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 15:29:11.359245 systemd[1]: Startup finished in 1.913s (kernel) + 22.030s (initrd) + 15.487s (userspace) = 39.431s. Dec 13 15:29:11.386105 curl[1682]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Dec 13 15:29:11.388435 systemd[1]: packet-phone-home.service: Deactivated successfully. Dec 13 15:29:15.267181 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 15:29:15.267777 systemd[1]: Stopped kubelet.service. Dec 13 15:29:15.270354 systemd[1]: Starting kubelet.service... Dec 13 15:29:15.493749 systemd[1]: Started kubelet.service. Dec 13 15:29:15.521449 kubelet[1689]: E1213 15:29:15.521334 1689 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:29:15.523365 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:29:15.523438 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:29:21.103256 systemd[1]: Started sshd@3-147.28.180.167:22-139.178.89.65:42680.service. Dec 13 15:29:21.140127 sshd[1708]: Accepted publickey for core from 139.178.89.65 port 42680 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:29:21.141154 sshd[1708]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:21.144587 systemd-logind[1594]: New session 6 of user core. Dec 13 15:29:21.145392 systemd[1]: Started session-6.scope. Dec 13 15:29:21.202183 sshd[1708]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:21.203803 systemd[1]: sshd@3-147.28.180.167:22-139.178.89.65:42680.service: Deactivated successfully. Dec 13 15:29:21.204111 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 15:29:21.204446 systemd-logind[1594]: Session 6 logged out. Waiting for processes to exit. Dec 13 15:29:21.205020 systemd[1]: Started sshd@4-147.28.180.167:22-139.178.89.65:42692.service. Dec 13 15:29:21.205483 systemd-logind[1594]: Removed session 6. Dec 13 15:29:21.242422 sshd[1714]: Accepted publickey for core from 139.178.89.65 port 42692 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:29:21.243496 sshd[1714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:21.247016 systemd-logind[1594]: New session 7 of user core. Dec 13 15:29:21.247751 systemd[1]: Started session-7.scope. Dec 13 15:29:21.302004 sshd[1714]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:21.303734 systemd[1]: sshd@4-147.28.180.167:22-139.178.89.65:42692.service: Deactivated successfully. Dec 13 15:29:21.304040 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 15:29:21.304403 systemd-logind[1594]: Session 7 logged out. Waiting for processes to exit. Dec 13 15:29:21.304951 systemd[1]: Started sshd@5-147.28.180.167:22-139.178.89.65:42694.service. Dec 13 15:29:21.305451 systemd-logind[1594]: Removed session 7. Dec 13 15:29:21.342090 sshd[1721]: Accepted publickey for core from 139.178.89.65 port 42694 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:29:21.343258 sshd[1721]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:21.347547 systemd-logind[1594]: New session 8 of user core. Dec 13 15:29:21.348519 systemd[1]: Started session-8.scope. Dec 13 15:29:21.420849 sshd[1721]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:21.428058 systemd[1]: sshd@5-147.28.180.167:22-139.178.89.65:42694.service: Deactivated successfully. Dec 13 15:29:21.429676 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 15:29:21.431411 systemd-logind[1594]: Session 8 logged out. Waiting for processes to exit. Dec 13 15:29:21.434064 systemd[1]: Started sshd@6-147.28.180.167:22-139.178.89.65:42706.service. Dec 13 15:29:21.436574 systemd-logind[1594]: Removed session 8. Dec 13 15:29:21.492022 sshd[1727]: Accepted publickey for core from 139.178.89.65 port 42706 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:29:21.492707 sshd[1727]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:21.494955 systemd-logind[1594]: New session 9 of user core. Dec 13 15:29:21.495399 systemd[1]: Started session-9.scope. Dec 13 15:29:21.570353 sudo[1730]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 15:29:21.571116 sudo[1730]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:29:21.589033 dbus-daemon[1518]: \xd0MB\x8e0V: received setenforce notice (enforcing=-1105867872) Dec 13 15:29:21.593527 sudo[1730]: pam_unix(sudo:session): session closed for user root Dec 13 15:29:21.598234 sshd[1727]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:21.605076 systemd[1]: sshd@6-147.28.180.167:22-139.178.89.65:42706.service: Deactivated successfully. Dec 13 15:29:21.606552 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 15:29:21.608199 systemd-logind[1594]: Session 9 logged out. Waiting for processes to exit. Dec 13 15:29:21.610900 systemd[1]: Started sshd@7-147.28.180.167:22-139.178.89.65:42710.service. Dec 13 15:29:21.613267 systemd-logind[1594]: Removed session 9. Dec 13 15:29:21.681941 sshd[1734]: Accepted publickey for core from 139.178.89.65 port 42710 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:29:21.684966 sshd[1734]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:21.694768 systemd-logind[1594]: New session 10 of user core. Dec 13 15:29:21.696970 systemd[1]: Started session-10.scope. Dec 13 15:29:21.774847 sudo[1738]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 15:29:21.775511 sudo[1738]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:29:21.783059 sudo[1738]: pam_unix(sudo:session): session closed for user root Dec 13 15:29:21.796169 sudo[1737]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 15:29:21.796882 sudo[1737]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:29:21.819989 systemd[1]: Stopping audit-rules.service... Dec 13 15:29:21.821000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:29:21.823074 auditctl[1741]: No rules Dec 13 15:29:21.823876 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 15:29:21.824274 systemd[1]: Stopped audit-rules.service. Dec 13 15:29:21.827912 systemd[1]: Starting audit-rules.service... Dec 13 15:29:21.828640 kernel: kauditd_printk_skb: 134 callbacks suppressed Dec 13 15:29:21.828757 kernel: audit: type=1305 audit(1734103761.821:186): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:29:21.821000 audit[1741]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc76f44ea0 a2=420 a3=0 items=0 ppid=1 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:21.864759 augenrules[1758]: No rules Dec 13 15:29:21.865461 systemd[1]: Finished audit-rules.service. Dec 13 15:29:21.866284 sudo[1737]: pam_unix(sudo:session): session closed for user root Dec 13 15:29:21.867637 sshd[1734]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:21.870500 systemd[1]: sshd@7-147.28.180.167:22-139.178.89.65:42710.service: Deactivated successfully. Dec 13 15:29:21.871034 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 15:29:21.871570 systemd-logind[1594]: Session 10 logged out. Waiting for processes to exit. Dec 13 15:29:21.872520 systemd[1]: Started sshd@8-147.28.180.167:22-139.178.89.65:42718.service. Dec 13 15:29:21.873277 systemd-logind[1594]: Removed session 10. Dec 13 15:29:21.876388 kernel: audit: type=1300 audit(1734103761.821:186): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc76f44ea0 a2=420 a3=0 items=0 ppid=1 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:21.876436 kernel: audit: type=1327 audit(1734103761.821:186): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:29:21.821000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:29:21.886070 kernel: audit: type=1131 audit(1734103761.823:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.908820 kernel: audit: type=1130 audit(1734103761.864:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.931525 kernel: audit: type=1106 audit(1734103761.864:189): pid=1737 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.864000 audit[1737]: USER_END pid=1737 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.957920 kernel: audit: type=1104 audit(1734103761.864:190): pid=1737 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.864000 audit[1737]: CRED_DISP pid=1737 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.962561 sshd[1764]: Accepted publickey for core from 139.178.89.65 port 42718 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:29:21.963849 sshd[1764]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:21.966164 systemd-logind[1594]: New session 11 of user core. Dec 13 15:29:21.966647 systemd[1]: Started session-11.scope. Dec 13 15:29:21.981823 kernel: audit: type=1106 audit(1734103761.867:191): pid=1734 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:29:21.867000 audit[1734]: USER_END pid=1734 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:29:22.013825 sudo[1767]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 15:29:22.013946 sudo[1767]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:29:22.014322 kernel: audit: type=1104 audit(1734103761.867:192): pid=1734 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:29:21.867000 audit[1734]: CRED_DISP pid=1734 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:29:22.040504 kernel: audit: type=1131 audit(1734103761.869:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.28.180.167:22-139.178.89.65:42710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.28.180.167:22-139.178.89.65:42710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.28.180.167:22-139.178.89.65:42718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.957000 audit[1764]: USER_ACCT pid=1764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:29:21.962000 audit[1764]: CRED_ACQ pid=1764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:29:21.962000 audit[1764]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6319dd00 a2=3 a3=0 items=0 ppid=1 pid=1764 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:21.962000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:21.967000 audit[1764]: USER_START pid=1764 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:29:21.967000 audit[1766]: CRED_ACQ pid=1766 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:29:22.010000 audit[1767]: USER_ACCT pid=1767 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:29:22.010000 audit[1767]: CRED_REFR pid=1767 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:29:22.014000 audit[1767]: USER_START pid=1767 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:29:22.650444 systemd[1]: Stopped kubelet.service. Dec 13 15:29:22.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:22.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:22.651758 systemd[1]: Starting kubelet.service... Dec 13 15:29:22.665520 systemd[1]: Reloading. Dec 13 15:29:22.696730 /usr/lib/systemd/system-generators/torcx-generator[1842]: time="2024-12-13T15:29:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:29:22.696748 /usr/lib/systemd/system-generators/torcx-generator[1842]: time="2024-12-13T15:29:22Z" level=info msg="torcx already run" Dec 13 15:29:22.757315 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:29:22.757324 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:29:22.770203 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit: BPF prog-id=40 op=LOAD Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.815000 audit: BPF prog-id=41 op=LOAD Dec 13 15:29:22.815000 audit: BPF prog-id=24 op=UNLOAD Dec 13 15:29:22.815000 audit: BPF prog-id=25 op=UNLOAD Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit: BPF prog-id=42 op=LOAD Dec 13 15:29:22.816000 audit: BPF prog-id=35 op=UNLOAD Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit: BPF prog-id=43 op=LOAD Dec 13 15:29:22.816000 audit: BPF prog-id=26 op=UNLOAD Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit: BPF prog-id=44 op=LOAD Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit: BPF prog-id=45 op=LOAD Dec 13 15:29:22.817000 audit: BPF prog-id=27 op=UNLOAD Dec 13 15:29:22.817000 audit: BPF prog-id=28 op=UNLOAD Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.817000 audit: BPF prog-id=46 op=LOAD Dec 13 15:29:22.817000 audit: BPF prog-id=29 op=UNLOAD Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit: BPF prog-id=47 op=LOAD Dec 13 15:29:22.818000 audit: BPF prog-id=30 op=UNLOAD Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit: BPF prog-id=48 op=LOAD Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit: BPF prog-id=49 op=LOAD Dec 13 15:29:22.819000 audit: BPF prog-id=31 op=UNLOAD Dec 13 15:29:22.819000 audit: BPF prog-id=32 op=UNLOAD Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.819000 audit: BPF prog-id=50 op=LOAD Dec 13 15:29:22.819000 audit: BPF prog-id=34 op=UNLOAD Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit: BPF prog-id=51 op=LOAD Dec 13 15:29:22.820000 audit: BPF prog-id=36 op=UNLOAD Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit: BPF prog-id=52 op=LOAD Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit: BPF prog-id=53 op=LOAD Dec 13 15:29:22.821000 audit: BPF prog-id=37 op=UNLOAD Dec 13 15:29:22.821000 audit: BPF prog-id=38 op=UNLOAD Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:22.821000 audit: BPF prog-id=54 op=LOAD Dec 13 15:29:22.821000 audit: BPF prog-id=33 op=UNLOAD Dec 13 15:29:22.838583 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 15:29:22.838621 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 15:29:22.838728 systemd[1]: Stopped kubelet.service. Dec 13 15:29:22.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:29:22.839548 systemd[1]: Starting kubelet.service... Dec 13 15:29:23.044449 systemd[1]: Started kubelet.service. Dec 13 15:29:23.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:23.069681 kubelet[1908]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:29:23.069681 kubelet[1908]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:29:23.069681 kubelet[1908]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:29:23.069899 kubelet[1908]: I1213 15:29:23.069717 1908 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:29:23.289922 kubelet[1908]: I1213 15:29:23.289875 1908 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 15:29:23.289922 kubelet[1908]: I1213 15:29:23.289889 1908 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:29:23.290025 kubelet[1908]: I1213 15:29:23.290015 1908 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 15:29:23.311419 kubelet[1908]: I1213 15:29:23.311348 1908 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:29:23.320536 kubelet[1908]: E1213 15:29:23.320518 1908 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 15:29:23.320536 kubelet[1908]: I1213 15:29:23.320535 1908 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 15:29:23.340426 kubelet[1908]: I1213 15:29:23.340390 1908 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:29:23.341741 kubelet[1908]: I1213 15:29:23.341701 1908 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 15:29:23.341784 kubelet[1908]: I1213 15:29:23.341773 1908 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:29:23.341911 kubelet[1908]: I1213 15:29:23.341787 1908 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.80.21","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 15:29:23.341911 kubelet[1908]: I1213 15:29:23.341887 1908 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:29:23.341911 kubelet[1908]: I1213 15:29:23.341893 1908 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 15:29:23.342025 kubelet[1908]: I1213 15:29:23.341939 1908 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:29:23.343608 kubelet[1908]: I1213 15:29:23.343573 1908 kubelet.go:408] "Attempting to sync node with API server" Dec 13 15:29:23.343608 kubelet[1908]: I1213 15:29:23.343583 1908 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:29:23.343608 kubelet[1908]: I1213 15:29:23.343599 1908 kubelet.go:314] "Adding apiserver pod source" Dec 13 15:29:23.343608 kubelet[1908]: I1213 15:29:23.343607 1908 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:29:23.343693 kubelet[1908]: E1213 15:29:23.343646 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:23.343693 kubelet[1908]: E1213 15:29:23.343659 1908 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:23.352499 kubelet[1908]: I1213 15:29:23.352462 1908 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:29:23.354180 kubelet[1908]: I1213 15:29:23.354142 1908 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:29:23.354797 kubelet[1908]: W1213 15:29:23.354760 1908 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 15:29:23.355114 kubelet[1908]: I1213 15:29:23.355069 1908 server.go:1269] "Started kubelet" Dec 13 15:29:23.355152 kubelet[1908]: I1213 15:29:23.355122 1908 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:29:23.355245 kubelet[1908]: I1213 15:29:23.355214 1908 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:29:23.355390 kubelet[1908]: I1213 15:29:23.355350 1908 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:29:23.355000 audit[1908]: AVC avc: denied { mac_admin } for pid=1908 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:23.355000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:29:23.355000 audit[1908]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e0a930 a1=c000e2e6a8 a2=c000e0a900 a3=25 items=0 ppid=1 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.355000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:29:23.355000 audit[1908]: AVC avc: denied { mac_admin } for pid=1908 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:23.355000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:29:23.355000 audit[1908]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e0c2e0 a1=c000e2e6c0 a2=c000e0a9c0 a3=25 items=0 ppid=1 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.355000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:29:23.356227 kubelet[1908]: I1213 15:29:23.355931 1908 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:29:23.356227 kubelet[1908]: I1213 15:29:23.355959 1908 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:29:23.357183 kubelet[1908]: I1213 15:29:23.357166 1908 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:29:23.357299 kubelet[1908]: I1213 15:29:23.357279 1908 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 15:29:23.357761 kubelet[1908]: E1213 15:29:23.357310 1908 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.80.21\" not found" Dec 13 15:29:23.358198 kubelet[1908]: I1213 15:29:23.358176 1908 server.go:460] "Adding debug handlers to kubelet server" Dec 13 15:29:23.358271 kubelet[1908]: E1213 15:29:23.358210 1908 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 15:29:23.358352 kubelet[1908]: I1213 15:29:23.358276 1908 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 15:29:23.358391 kubelet[1908]: I1213 15:29:23.358377 1908 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:29:23.358421 kubelet[1908]: I1213 15:29:23.358391 1908 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 15:29:23.358543 kubelet[1908]: I1213 15:29:23.358524 1908 reconciler.go:26] "Reconciler: start to sync state" Dec 13 15:29:23.358668 kubelet[1908]: I1213 15:29:23.358645 1908 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:29:23.363373 kubelet[1908]: I1213 15:29:23.363327 1908 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:29:23.365740 kubelet[1908]: E1213 15:29:23.365721 1908 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.80.21\" not found" node="10.67.80.21" Dec 13 15:29:23.369736 kubelet[1908]: I1213 15:29:23.369695 1908 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:29:23.369736 kubelet[1908]: I1213 15:29:23.369704 1908 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:29:23.369736 kubelet[1908]: I1213 15:29:23.369715 1908 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:29:23.370786 kubelet[1908]: I1213 15:29:23.370747 1908 policy_none.go:49] "None policy: Start" Dec 13 15:29:23.371092 kubelet[1908]: I1213 15:29:23.371053 1908 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:29:23.371092 kubelet[1908]: I1213 15:29:23.371067 1908 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:29:23.380417 systemd[1]: Created slice kubepods.slice. Dec 13 15:29:23.383369 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 15:29:23.385438 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 15:29:23.384000 audit[1935]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:23.384000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc6aa2e200 a2=0 a3=7ffc6aa2e1ec items=0 ppid=1908 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:29:23.385000 audit[1938]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:23.385000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffcd591a580 a2=0 a3=7ffcd591a56c items=0 ppid=1908 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:29:23.399411 kubelet[1908]: I1213 15:29:23.399331 1908 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:29:23.397000 audit[1908]: AVC avc: denied { mac_admin } for pid=1908 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:23.397000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:29:23.397000 audit[1908]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ec1410 a1=c000f4f158 a2=c000ec13e0 a3=25 items=0 ppid=1 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.397000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:29:23.400188 kubelet[1908]: I1213 15:29:23.399465 1908 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:29:23.400188 kubelet[1908]: I1213 15:29:23.399730 1908 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 15:29:23.400188 kubelet[1908]: I1213 15:29:23.399756 1908 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 15:29:23.400188 kubelet[1908]: I1213 15:29:23.400137 1908 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:29:23.402106 kubelet[1908]: E1213 15:29:23.402055 1908 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.80.21\" not found" Dec 13 15:29:23.387000 audit[1940]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:23.387000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe1cb69fe0 a2=0 a3=7ffe1cb69fcc items=0 ppid=1908 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:29:23.439000 audit[1945]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:23.439000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe5875e150 a2=0 a3=7ffe5875e13c items=0 ppid=1908 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:29:23.494000 audit[1950]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:23.494000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc8e5f4360 a2=0 a3=7ffc8e5f434c items=0 ppid=1908 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 15:29:23.496722 kubelet[1908]: I1213 15:29:23.496665 1908 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:29:23.495000 audit[1951]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:23.495000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd4b8644a0 a2=0 a3=7ffd4b86448c items=0 ppid=1908 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:29:23.495000 audit[1952]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:23.495000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff25cf3750 a2=0 a3=7fff25cf373c items=0 ppid=1908 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.495000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:29:23.497281 kubelet[1908]: I1213 15:29:23.497224 1908 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:29:23.497281 kubelet[1908]: I1213 15:29:23.497245 1908 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:29:23.497281 kubelet[1908]: I1213 15:29:23.497257 1908 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 15:29:23.497347 kubelet[1908]: E1213 15:29:23.497329 1908 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 15:29:23.496000 audit[1953]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:23.496000 audit[1953]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffd7bccf10 a2=0 a3=7fffd7bccefc items=0 ppid=1908 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:29:23.496000 audit[1954]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:23.496000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1302f860 a2=0 a3=7ffe1302f84c items=0 ppid=1908 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:29:23.496000 audit[1955]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:23.496000 audit[1955]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd513d920 a2=0 a3=7fffd513d90c items=0 ppid=1908 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:29:23.496000 audit[1956]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:23.496000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcb87900b0 a2=0 a3=7ffcb879009c items=0 ppid=1908 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:29:23.497000 audit[1957]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:23.497000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd482ba40 a2=0 a3=7fffd482ba2c items=0 ppid=1908 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:23.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:29:23.500769 kubelet[1908]: I1213 15:29:23.500759 1908 kubelet_node_status.go:72] "Attempting to register node" node="10.67.80.21" Dec 13 15:29:23.509213 kubelet[1908]: I1213 15:29:23.509123 1908 kubelet_node_status.go:75] "Successfully registered node" node="10.67.80.21" Dec 13 15:29:23.509213 kubelet[1908]: E1213 15:29:23.509201 1908 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.67.80.21\": node \"10.67.80.21\" not found" Dec 13 15:29:23.518555 kubelet[1908]: I1213 15:29:23.518516 1908 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 15:29:23.519165 env[1553]: time="2024-12-13T15:29:23.519105870Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 15:29:23.519698 kubelet[1908]: I1213 15:29:23.519449 1908 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 15:29:23.592776 sudo[1767]: pam_unix(sudo:session): session closed for user root Dec 13 15:29:23.591000 audit[1767]: USER_END pid=1767 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:29:23.591000 audit[1767]: CRED_DISP pid=1767 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:29:23.596346 sshd[1764]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:23.597000 audit[1764]: USER_END pid=1764 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:29:23.597000 audit[1764]: CRED_DISP pid=1764 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:29:23.602341 systemd[1]: sshd@8-147.28.180.167:22-139.178.89.65:42718.service: Deactivated successfully. Dec 13 15:29:23.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.28.180.167:22-139.178.89.65:42718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:23.604343 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 15:29:23.606177 systemd-logind[1594]: Session 11 logged out. Waiting for processes to exit. Dec 13 15:29:23.608206 systemd-logind[1594]: Removed session 11. Dec 13 15:29:24.291896 kubelet[1908]: I1213 15:29:24.291792 1908 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 15:29:24.292944 kubelet[1908]: W1213 15:29:24.292171 1908 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 15:29:24.292944 kubelet[1908]: W1213 15:29:24.292233 1908 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 15:29:24.292944 kubelet[1908]: W1213 15:29:24.292292 1908 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 15:29:24.344741 kubelet[1908]: I1213 15:29:24.344663 1908 apiserver.go:52] "Watching apiserver" Dec 13 15:29:24.344741 kubelet[1908]: E1213 15:29:24.344730 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:24.351972 kubelet[1908]: E1213 15:29:24.351895 1908 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-db4v6" podUID="3b9a97fb-54b1-484f-901b-65fe950c1956" Dec 13 15:29:24.358792 kubelet[1908]: I1213 15:29:24.358740 1908 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 15:29:24.360055 systemd[1]: Created slice kubepods-besteffort-pod9dd35790_9d6b_405b_8a4f_1590c059d0c4.slice. Dec 13 15:29:24.364427 kubelet[1908]: I1213 15:29:24.364372 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/3b9a97fb-54b1-484f-901b-65fe950c1956-socket-dir\") pod \"csi-node-driver-db4v6\" (UID: \"3b9a97fb-54b1-484f-901b-65fe950c1956\") " pod="calico-system/csi-node-driver-db4v6" Dec 13 15:29:24.364427 kubelet[1908]: I1213 15:29:24.364389 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9dd35790-9d6b-405b-8a4f-1590c059d0c4-lib-modules\") pod \"kube-proxy-wpt9m\" (UID: \"9dd35790-9d6b-405b-8a4f-1590c059d0c4\") " pod="kube-system/kube-proxy-wpt9m" Dec 13 15:29:24.364427 kubelet[1908]: I1213 15:29:24.364398 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ttcs9\" (UniqueName: \"kubernetes.io/projected/9dd35790-9d6b-405b-8a4f-1590c059d0c4-kube-api-access-ttcs9\") pod \"kube-proxy-wpt9m\" (UID: \"9dd35790-9d6b-405b-8a4f-1590c059d0c4\") " pod="kube-system/kube-proxy-wpt9m" Dec 13 15:29:24.364514 kubelet[1908]: I1213 15:29:24.364430 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-var-run-calico\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364514 kubelet[1908]: I1213 15:29:24.364438 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-var-lib-calico\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364514 kubelet[1908]: I1213 15:29:24.364450 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/3b9a97fb-54b1-484f-901b-65fe950c1956-varrun\") pod \"csi-node-driver-db4v6\" (UID: \"3b9a97fb-54b1-484f-901b-65fe950c1956\") " pod="calico-system/csi-node-driver-db4v6" Dec 13 15:29:24.364514 kubelet[1908]: I1213 15:29:24.364482 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-policysync\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364514 kubelet[1908]: I1213 15:29:24.364493 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-tigera-ca-bundle\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364600 kubelet[1908]: I1213 15:29:24.364501 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-flexvol-driver-host\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364600 kubelet[1908]: I1213 15:29:24.364513 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-lib-modules\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364600 kubelet[1908]: I1213 15:29:24.364522 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d8fkd\" (UniqueName: \"kubernetes.io/projected/3b9a97fb-54b1-484f-901b-65fe950c1956-kube-api-access-d8fkd\") pod \"csi-node-driver-db4v6\" (UID: \"3b9a97fb-54b1-484f-901b-65fe950c1956\") " pod="calico-system/csi-node-driver-db4v6" Dec 13 15:29:24.364600 kubelet[1908]: I1213 15:29:24.364530 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9dd35790-9d6b-405b-8a4f-1590c059d0c4-xtables-lock\") pod \"kube-proxy-wpt9m\" (UID: \"9dd35790-9d6b-405b-8a4f-1590c059d0c4\") " pod="kube-system/kube-proxy-wpt9m" Dec 13 15:29:24.364600 kubelet[1908]: I1213 15:29:24.364540 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-cni-bin-dir\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364747 kubelet[1908]: I1213 15:29:24.364548 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-cni-net-dir\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364747 kubelet[1908]: I1213 15:29:24.364555 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-cni-log-dir\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364747 kubelet[1908]: I1213 15:29:24.364563 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jstfq\" (UniqueName: \"kubernetes.io/projected/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-kube-api-access-jstfq\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364747 kubelet[1908]: I1213 15:29:24.364572 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/3b9a97fb-54b1-484f-901b-65fe950c1956-registration-dir\") pod \"csi-node-driver-db4v6\" (UID: \"3b9a97fb-54b1-484f-901b-65fe950c1956\") " pod="calico-system/csi-node-driver-db4v6" Dec 13 15:29:24.364747 kubelet[1908]: I1213 15:29:24.364580 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9dd35790-9d6b-405b-8a4f-1590c059d0c4-kube-proxy\") pod \"kube-proxy-wpt9m\" (UID: \"9dd35790-9d6b-405b-8a4f-1590c059d0c4\") " pod="kube-system/kube-proxy-wpt9m" Dec 13 15:29:24.364828 kubelet[1908]: I1213 15:29:24.364588 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-xtables-lock\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364828 kubelet[1908]: I1213 15:29:24.364595 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/efe5e4a1-37d0-4212-b034-e6ea8cdd4348-node-certs\") pod \"calico-node-rsr7v\" (UID: \"efe5e4a1-37d0-4212-b034-e6ea8cdd4348\") " pod="calico-system/calico-node-rsr7v" Dec 13 15:29:24.364828 kubelet[1908]: I1213 15:29:24.364625 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/3b9a97fb-54b1-484f-901b-65fe950c1956-kubelet-dir\") pod \"csi-node-driver-db4v6\" (UID: \"3b9a97fb-54b1-484f-901b-65fe950c1956\") " pod="calico-system/csi-node-driver-db4v6" Dec 13 15:29:24.375593 systemd[1]: Created slice kubepods-besteffort-podefe5e4a1_37d0_4212_b034_e6ea8cdd4348.slice. Dec 13 15:29:24.466461 kubelet[1908]: I1213 15:29:24.466378 1908 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 15:29:24.467732 kubelet[1908]: E1213 15:29:24.467677 1908 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:29:24.467732 kubelet[1908]: W1213 15:29:24.467726 1908 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:29:24.468073 kubelet[1908]: E1213 15:29:24.467777 1908 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:29:24.468405 kubelet[1908]: E1213 15:29:24.468368 1908 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:29:24.468405 kubelet[1908]: W1213 15:29:24.468404 1908 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:29:24.468685 kubelet[1908]: E1213 15:29:24.468439 1908 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:29:24.472894 kubelet[1908]: E1213 15:29:24.472861 1908 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:29:24.472894 kubelet[1908]: W1213 15:29:24.472869 1908 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:29:24.472894 kubelet[1908]: E1213 15:29:24.472894 1908 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:29:24.473764 kubelet[1908]: E1213 15:29:24.473728 1908 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:29:24.473764 kubelet[1908]: W1213 15:29:24.473735 1908 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:29:24.473764 kubelet[1908]: E1213 15:29:24.473743 1908 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:29:24.473908 kubelet[1908]: E1213 15:29:24.473870 1908 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:29:24.473908 kubelet[1908]: W1213 15:29:24.473878 1908 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:29:24.473908 kubelet[1908]: E1213 15:29:24.473887 1908 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:29:24.473985 kubelet[1908]: E1213 15:29:24.473979 1908 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:29:24.474004 kubelet[1908]: W1213 15:29:24.473986 1908 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:29:24.474004 kubelet[1908]: E1213 15:29:24.473993 1908 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:29:24.676967 env[1553]: time="2024-12-13T15:29:24.676718464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wpt9m,Uid:9dd35790-9d6b-405b-8a4f-1590c059d0c4,Namespace:kube-system,Attempt:0,}" Dec 13 15:29:24.677820 env[1553]: time="2024-12-13T15:29:24.677734595Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rsr7v,Uid:efe5e4a1-37d0-4212-b034-e6ea8cdd4348,Namespace:calico-system,Attempt:0,}" Dec 13 15:29:25.341275 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount986908434.mount: Deactivated successfully. Dec 13 15:29:25.342891 env[1553]: time="2024-12-13T15:29:25.342844332Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:25.343589 env[1553]: time="2024-12-13T15:29:25.343552353Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:25.344396 env[1553]: time="2024-12-13T15:29:25.344353785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:25.344841 env[1553]: time="2024-12-13T15:29:25.344794686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:25.344874 kubelet[1908]: E1213 15:29:25.344837 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:25.345757 env[1553]: time="2024-12-13T15:29:25.345712561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:25.346088 env[1553]: time="2024-12-13T15:29:25.346050021Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:25.347552 env[1553]: time="2024-12-13T15:29:25.347512710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:25.348290 env[1553]: time="2024-12-13T15:29:25.348254415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:25.356702 env[1553]: time="2024-12-13T15:29:25.356604548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:29:25.356702 env[1553]: time="2024-12-13T15:29:25.356631892Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:29:25.356702 env[1553]: time="2024-12-13T15:29:25.356639458Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:29:25.356850 env[1553]: time="2024-12-13T15:29:25.356752388Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6639f6bdc0e6c08dbe4d97a20428b2ac41dce1249821d49adc23fe85611ce8d7 pid=1983 runtime=io.containerd.runc.v2 Dec 13 15:29:25.357317 env[1553]: time="2024-12-13T15:29:25.357266381Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:29:25.357317 env[1553]: time="2024-12-13T15:29:25.357283512Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:29:25.357317 env[1553]: time="2024-12-13T15:29:25.357290519Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:29:25.357389 env[1553]: time="2024-12-13T15:29:25.357344980Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/51cb2e8e693c7f31ca6d751d30ac53155bca0753f04f0a262776c76dccb05964 pid=1988 runtime=io.containerd.runc.v2 Dec 13 15:29:25.365038 systemd[1]: Started cri-containerd-51cb2e8e693c7f31ca6d751d30ac53155bca0753f04f0a262776c76dccb05964.scope. Dec 13 15:29:25.366346 systemd[1]: Started cri-containerd-6639f6bdc0e6c08dbe4d97a20428b2ac41dce1249821d49adc23fe85611ce8d7.scope. Dec 13 15:29:25.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit: BPF prog-id=55 op=LOAD Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1983 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636333966366264633065366330386462653464393761323034323862 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1983 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636333966366264633065366330386462653464393761323034323862 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit: BPF prog-id=56 op=LOAD Dec 13 15:29:25.369000 audit[2003]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c1570 items=0 ppid=1983 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636333966366264633065366330386462653464393761323034323862 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit: BPF prog-id=57 op=LOAD Dec 13 15:29:25.369000 audit[2003]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c15b8 items=0 ppid=1983 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636333966366264633065366330386462653464393761323034323862 Dec 13 15:29:25.369000 audit: BPF prog-id=57 op=UNLOAD Dec 13 15:29:25.369000 audit: BPF prog-id=56 op=UNLOAD Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { perfmon } for pid=2003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit[2003]: AVC avc: denied { bpf } for pid=2003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.369000 audit: BPF prog-id=58 op=LOAD Dec 13 15:29:25.369000 audit[2003]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002c19c8 items=0 ppid=1983 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636333966366264633065366330386462653464393761323034323862 Dec 13 15:29:25.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit: BPF prog-id=59 op=LOAD Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1988 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636232653865363933633766333163613664373531643330616335 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1988 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636232653865363933633766333163613664373531643330616335 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit: BPF prog-id=60 op=LOAD Dec 13 15:29:25.370000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000220af0 items=0 ppid=1988 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636232653865363933633766333163613664373531643330616335 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit: BPF prog-id=61 op=LOAD Dec 13 15:29:25.370000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000220b38 items=0 ppid=1988 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636232653865363933633766333163613664373531643330616335 Dec 13 15:29:25.370000 audit: BPF prog-id=61 op=UNLOAD Dec 13 15:29:25.370000 audit: BPF prog-id=60 op=UNLOAD Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:25.370000 audit: BPF prog-id=62 op=LOAD Dec 13 15:29:25.370000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000220f48 items=0 ppid=1988 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636232653865363933633766333163613664373531643330616335 Dec 13 15:29:25.377031 env[1553]: time="2024-12-13T15:29:25.376994757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rsr7v,Uid:efe5e4a1-37d0-4212-b034-e6ea8cdd4348,Namespace:calico-system,Attempt:0,} returns sandbox id \"6639f6bdc0e6c08dbe4d97a20428b2ac41dce1249821d49adc23fe85611ce8d7\"" Dec 13 15:29:25.377210 env[1553]: time="2024-12-13T15:29:25.376994818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wpt9m,Uid:9dd35790-9d6b-405b-8a4f-1590c059d0c4,Namespace:kube-system,Attempt:0,} returns sandbox id \"51cb2e8e693c7f31ca6d751d30ac53155bca0753f04f0a262776c76dccb05964\"" Dec 13 15:29:25.378974 env[1553]: time="2024-12-13T15:29:25.378962173Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 15:29:26.346058 kubelet[1908]: E1213 15:29:26.345894 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:26.498097 kubelet[1908]: E1213 15:29:26.497965 1908 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-db4v6" podUID="3b9a97fb-54b1-484f-901b-65fe950c1956" Dec 13 15:29:27.347118 kubelet[1908]: E1213 15:29:27.347016 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:27.403015 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount988584832.mount: Deactivated successfully. Dec 13 15:29:27.482914 env[1553]: time="2024-12-13T15:29:27.482860647Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:27.483491 env[1553]: time="2024-12-13T15:29:27.483450542Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:27.484048 env[1553]: time="2024-12-13T15:29:27.484001785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:27.485020 env[1553]: time="2024-12-13T15:29:27.484968289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:27.485163 env[1553]: time="2024-12-13T15:29:27.485110970Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 15:29:27.485970 env[1553]: time="2024-12-13T15:29:27.485941293Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 15:29:27.486905 env[1553]: time="2024-12-13T15:29:27.486874127Z" level=info msg="CreateContainer within sandbox \"6639f6bdc0e6c08dbe4d97a20428b2ac41dce1249821d49adc23fe85611ce8d7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 15:29:27.492842 env[1553]: time="2024-12-13T15:29:27.492798263Z" level=info msg="CreateContainer within sandbox \"6639f6bdc0e6c08dbe4d97a20428b2ac41dce1249821d49adc23fe85611ce8d7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e748c953dbf39bda48731af9e314a40f98e71e9542257e0ce5b1675a54fe40f7\"" Dec 13 15:29:27.493168 env[1553]: time="2024-12-13T15:29:27.493120825Z" level=info msg="StartContainer for \"e748c953dbf39bda48731af9e314a40f98e71e9542257e0ce5b1675a54fe40f7\"" Dec 13 15:29:27.502910 systemd[1]: Started cri-containerd-e748c953dbf39bda48731af9e314a40f98e71e9542257e0ce5b1675a54fe40f7.scope. Dec 13 15:29:27.509000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.515939 kernel: kauditd_printk_skb: 354 callbacks suppressed Dec 13 15:29:27.516008 kernel: audit: type=1400 audit(1734103767.509:435): avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit[2060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f55d06ffcb8 items=0 ppid=1983 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:27.604010 kernel: audit: type=1300 audit(1734103767.509:435): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f55d06ffcb8 items=0 ppid=1983 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:27.604040 kernel: audit: type=1327 audit(1734103767.509:435): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537343863393533646266333962646134383733316166396533313461 Dec 13 15:29:27.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537343863393533646266333962646134383733316166396533313461 Dec 13 15:29:27.684876 kernel: audit: type=1400 audit(1734103767.509:436): avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.741284 kernel: audit: type=1400 audit(1734103767.509:436): avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.858889 kernel: audit: type=1400 audit(1734103767.509:436): avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.858915 kernel: audit: type=1400 audit(1734103767.509:436): avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.863750 env[1553]: time="2024-12-13T15:29:27.863727464Z" level=info msg="StartContainer for \"e748c953dbf39bda48731af9e314a40f98e71e9542257e0ce5b1675a54fe40f7\" returns successfully" Dec 13 15:29:27.920391 kernel: audit: type=1400 audit(1734103767.509:436): avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.920634 systemd[1]: cri-containerd-e748c953dbf39bda48731af9e314a40f98e71e9542257e0ce5b1675a54fe40f7.scope: Deactivated successfully. Dec 13 15:29:27.983048 kernel: audit: type=1400 audit(1734103767.509:436): avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.110564 kernel: audit: type=1400 audit(1734103767.509:436): avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.509000 audit: BPF prog-id=63 op=LOAD Dec 13 15:29:27.509000 audit[2060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b4ee8 items=0 ppid=1983 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:27.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537343863393533646266333962646134383733316166396533313461 Dec 13 15:29:27.535000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.535000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.535000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.535000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.535000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.535000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.535000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.535000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.535000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.535000 audit: BPF prog-id=64 op=LOAD Dec 13 15:29:27.535000 audit[2060]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b4f38 items=0 ppid=1983 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:27.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537343863393533646266333962646134383733316166396533313461 Dec 13 15:29:27.684000 audit: BPF prog-id=64 op=UNLOAD Dec 13 15:29:27.684000 audit: BPF prog-id=63 op=UNLOAD Dec 13 15:29:27.684000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.684000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.684000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.684000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.684000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.684000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.684000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.684000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.684000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.684000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:27.684000 audit: BPF prog-id=65 op=LOAD Dec 13 15:29:27.684000 audit[2060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b4fc8 items=0 ppid=1983 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:27.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537343863393533646266333962646134383733316166396533313461 Dec 13 15:29:28.047000 audit: BPF prog-id=65 op=UNLOAD Dec 13 15:29:28.120069 env[1553]: time="2024-12-13T15:29:28.119997685Z" level=info msg="shim disconnected" id=e748c953dbf39bda48731af9e314a40f98e71e9542257e0ce5b1675a54fe40f7 Dec 13 15:29:28.120069 env[1553]: time="2024-12-13T15:29:28.120028726Z" level=warning msg="cleaning up after shim disconnected" id=e748c953dbf39bda48731af9e314a40f98e71e9542257e0ce5b1675a54fe40f7 namespace=k8s.io Dec 13 15:29:28.120069 env[1553]: time="2024-12-13T15:29:28.120037289Z" level=info msg="cleaning up dead shim" Dec 13 15:29:28.123650 env[1553]: time="2024-12-13T15:29:28.123632747Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:29:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2097 runtime=io.containerd.runc.v2\n" Dec 13 15:29:28.347567 kubelet[1908]: E1213 15:29:28.347515 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:28.370753 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e748c953dbf39bda48731af9e314a40f98e71e9542257e0ce5b1675a54fe40f7-rootfs.mount: Deactivated successfully. Dec 13 15:29:28.404542 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4257546468.mount: Deactivated successfully. Dec 13 15:29:28.497768 kubelet[1908]: E1213 15:29:28.497716 1908 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-db4v6" podUID="3b9a97fb-54b1-484f-901b-65fe950c1956" Dec 13 15:29:28.801409 env[1553]: time="2024-12-13T15:29:28.801366464Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:28.801960 env[1553]: time="2024-12-13T15:29:28.801920281Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:28.802681 env[1553]: time="2024-12-13T15:29:28.802645850Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:28.803329 env[1553]: time="2024-12-13T15:29:28.803295233Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:28.803980 env[1553]: time="2024-12-13T15:29:28.803945061Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 15:29:28.804596 env[1553]: time="2024-12-13T15:29:28.804557362Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 15:29:28.805313 env[1553]: time="2024-12-13T15:29:28.805256666Z" level=info msg="CreateContainer within sandbox \"51cb2e8e693c7f31ca6d751d30ac53155bca0753f04f0a262776c76dccb05964\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 15:29:28.811935 env[1553]: time="2024-12-13T15:29:28.811896341Z" level=info msg="CreateContainer within sandbox \"51cb2e8e693c7f31ca6d751d30ac53155bca0753f04f0a262776c76dccb05964\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"44eeb5d563e1b4f7b55bd1dbd79fbe9cfd9b2d2bdeec26c84d9c5b16c5a6d425\"" Dec 13 15:29:28.812317 env[1553]: time="2024-12-13T15:29:28.812264986Z" level=info msg="StartContainer for \"44eeb5d563e1b4f7b55bd1dbd79fbe9cfd9b2d2bdeec26c84d9c5b16c5a6d425\"" Dec 13 15:29:28.821103 systemd[1]: Started cri-containerd-44eeb5d563e1b4f7b55bd1dbd79fbe9cfd9b2d2bdeec26c84d9c5b16c5a6d425.scope. Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1b42579468 items=0 ppid=1988 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:28.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656562356435363365316234663762353562643164626437396662 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit: BPF prog-id=66 op=LOAD Dec 13 15:29:28.830000 audit[2122]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038c208 items=0 ppid=1988 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:28.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656562356435363365316234663762353562643164626437396662 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit: BPF prog-id=67 op=LOAD Dec 13 15:29:28.830000 audit[2122]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038c258 items=0 ppid=1988 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:28.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656562356435363365316234663762353562643164626437396662 Dec 13 15:29:28.830000 audit: BPF prog-id=67 op=UNLOAD Dec 13 15:29:28.830000 audit: BPF prog-id=66 op=UNLOAD Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { perfmon } for pid=2122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit[2122]: AVC avc: denied { bpf } for pid=2122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:28.830000 audit: BPF prog-id=68 op=LOAD Dec 13 15:29:28.830000 audit[2122]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038c2e8 items=0 ppid=1988 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:28.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656562356435363365316234663762353562643164626437396662 Dec 13 15:29:28.854683 env[1553]: time="2024-12-13T15:29:28.854630903Z" level=info msg="StartContainer for \"44eeb5d563e1b4f7b55bd1dbd79fbe9cfd9b2d2bdeec26c84d9c5b16c5a6d425\" returns successfully" Dec 13 15:29:28.976000 audit[2192]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:28.976000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeac3a4ce0 a2=0 a3=7ffeac3a4ccc items=0 ppid=2132 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:28.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:29:28.976000 audit[2191]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:28.976000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdee9142f0 a2=0 a3=f0bf4fd2efbc1539 items=0 ppid=2132 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:28.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:29:28.979000 audit[2193]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:28.979000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc1f6e3d0 a2=0 a3=7ffcc1f6e3bc items=0 ppid=2132 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:28.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:29:28.979000 audit[2194]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:28.979000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb663fbd0 a2=0 a3=7ffdb663fbbc items=0 ppid=2132 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:28.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:29:28.982000 audit[2197]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:28.982000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefeb8f2a0 a2=0 a3=7ffefeb8f28c items=0 ppid=2132 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:28.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:29:28.983000 audit[2198]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:28.983000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef2b02430 a2=0 a3=bf280f0603d6dad4 items=0 ppid=2132 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:28.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:29:29.079000 audit[2199]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.079000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff7c05c2a0 a2=0 a3=7fff7c05c28c items=0 ppid=2132 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:29:29.085000 audit[2201]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.085000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcc7f73070 a2=0 a3=7ffcc7f7305c items=0 ppid=2132 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 15:29:29.094000 audit[2204]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.094000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe0fe154e0 a2=0 a3=7ffe0fe154cc items=0 ppid=2132 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 15:29:29.097000 audit[2205]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.097000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcbda4490 a2=0 a3=7ffdcbda447c items=0 ppid=2132 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:29:29.102000 audit[2207]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.102000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd82226e20 a2=0 a3=7ffd82226e0c items=0 ppid=2132 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:29:29.105000 audit[2208]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.105000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe45b04420 a2=0 a3=7ffe45b0440c items=0 ppid=2132 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:29:29.111000 audit[2210]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.111000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc3ff68a70 a2=0 a3=7ffc3ff68a5c items=0 ppid=2132 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:29:29.119000 audit[2213]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.119000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd8c3a4100 a2=0 a3=7ffd8c3a40ec items=0 ppid=2132 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 15:29:29.122000 audit[2214]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.122000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeef9e76c0 a2=0 a3=7ffeef9e76ac items=0 ppid=2132 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:29:29.128000 audit[2216]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.128000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee58770f0 a2=0 a3=7ffee58770dc items=0 ppid=2132 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:29:29.130000 audit[2217]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.130000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe465cf390 a2=0 a3=7ffe465cf37c items=0 ppid=2132 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:29:29.136000 audit[2219]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.136000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe261b1290 a2=0 a3=7ffe261b127c items=0 ppid=2132 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:29:29.144000 audit[2222]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.144000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe405cd480 a2=0 a3=7ffe405cd46c items=0 ppid=2132 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.144000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:29:29.152000 audit[2225]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.152000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda921dbe0 a2=0 a3=7ffda921dbcc items=0 ppid=2132 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:29:29.155000 audit[2226]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.155000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff0a9e1830 a2=0 a3=7fff0a9e181c items=0 ppid=2132 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:29:29.160000 audit[2228]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.160000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff9f4e7920 a2=0 a3=7fff9f4e790c items=0 ppid=2132 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.160000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:29:29.207000 audit[2232]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.207000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffedcc9cf80 a2=0 a3=7ffedcc9cf6c items=0 ppid=2132 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.207000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:29:29.208000 audit[2233]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.208000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0d21f230 a2=0 a3=7ffe0d21f21c items=0 ppid=2132 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:29:29.210000 audit[2235]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:29:29.210000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff07346110 a2=0 a3=7fff073460fc items=0 ppid=2132 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:29:29.228000 audit[2241]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:29.228000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe902160d0 a2=0 a3=7ffe902160bc items=0 ppid=2132 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.228000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:29.278000 audit[2241]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:29.278000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffe902160d0 a2=0 a3=7ffe902160bc items=0 ppid=2132 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:29.294000 audit[2250]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.294000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffefa4fb270 a2=0 a3=7ffefa4fb25c items=0 ppid=2132 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:29:29.296000 audit[2252]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.296000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4a0be370 a2=0 a3=7ffe4a0be35c items=0 ppid=2132 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 15:29:29.301000 audit[2255]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.301000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe9aab6470 a2=0 a3=7ffe9aab645c items=0 ppid=2132 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 15:29:29.302000 audit[2256]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.302000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1a97ea20 a2=0 a3=7ffd1a97ea0c items=0 ppid=2132 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:29:29.304000 audit[2258]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.304000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1ca321d0 a2=0 a3=7ffd1ca321bc items=0 ppid=2132 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:29:29.305000 audit[2259]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.305000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2933e1a0 a2=0 a3=7ffd2933e18c items=0 ppid=2132 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:29:29.308000 audit[2261]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.308000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc8e4c7030 a2=0 a3=7ffc8e4c701c items=0 ppid=2132 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 15:29:29.312000 audit[2264]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.312000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdc6f46b50 a2=0 a3=7ffdc6f46b3c items=0 ppid=2132 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:29:29.313000 audit[2265]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.313000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8ff8b890 a2=0 a3=7ffd8ff8b87c items=0 ppid=2132 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:29:29.315000 audit[2267]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.315000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc6d5c580 a2=0 a3=7ffdc6d5c56c items=0 ppid=2132 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:29:29.316000 audit[2268]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.316000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc459cf90 a2=0 a3=7ffdc459cf7c items=0 ppid=2132 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:29:29.319000 audit[2270]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.319000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf864dc60 a2=0 a3=7ffcf864dc4c items=0 ppid=2132 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:29:29.322000 audit[2273]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.322000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0900ac80 a2=0 a3=7fff0900ac6c items=0 ppid=2132 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:29:29.325000 audit[2276]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.325000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed6f747b0 a2=0 a3=7ffed6f7479c items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 15:29:29.326000 audit[2277]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.326000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe4a516420 a2=0 a3=7ffe4a51640c items=0 ppid=2132 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:29:29.330000 audit[2279]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.330000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff872214d0 a2=0 a3=7fff872214bc items=0 ppid=2132 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:29:29.332000 audit[2282]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.332000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd15f96350 a2=0 a3=7ffd15f9633c items=0 ppid=2132 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:29:29.333000 audit[2283]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.333000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff7fc2330 a2=0 a3=7ffff7fc231c items=0 ppid=2132 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:29:29.336000 audit[2285]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.336000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd345b9970 a2=0 a3=7ffd345b995c items=0 ppid=2132 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:29:29.337000 audit[2286]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.337000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffea619080 a2=0 a3=7fffea61906c items=0 ppid=2132 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:29:29.339000 audit[2288]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.339000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe05f70b50 a2=0 a3=7ffe05f70b3c items=0 ppid=2132 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:29:29.343000 audit[2291]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:29:29.343000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd397a280 a2=0 a3=7fffd397a26c items=0 ppid=2132 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:29:29.346000 audit[2293]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:29:29.346000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd609ce7f0 a2=0 a3=7ffd609ce7dc items=0 ppid=2132 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.346000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:29.348256 kubelet[1908]: E1213 15:29:29.348198 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:29.346000 audit[2293]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:29:29.346000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd609ce7f0 a2=0 a3=7ffd609ce7dc items=0 ppid=2132 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.346000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:29.523918 kubelet[1908]: I1213 15:29:29.523771 1908 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-wpt9m" podStartSLOduration=3.098143474 podStartE2EDuration="6.523738231s" podCreationTimestamp="2024-12-13 15:29:23 +0000 UTC" firstStartedPulling="2024-12-13 15:29:25.378835829 +0000 UTC m=+2.328516015" lastFinishedPulling="2024-12-13 15:29:28.804430587 +0000 UTC m=+5.754110772" observedRunningTime="2024-12-13 15:29:29.523448805 +0000 UTC m=+6.473129052" watchObservedRunningTime="2024-12-13 15:29:29.523738231 +0000 UTC m=+6.473418465" Dec 13 15:29:30.348648 kubelet[1908]: E1213 15:29:30.348510 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:30.497884 kubelet[1908]: E1213 15:29:30.497809 1908 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-db4v6" podUID="3b9a97fb-54b1-484f-901b-65fe950c1956" Dec 13 15:29:31.348941 kubelet[1908]: E1213 15:29:31.348883 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:32.349860 kubelet[1908]: E1213 15:29:32.349812 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:32.498092 kubelet[1908]: E1213 15:29:32.498039 1908 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-db4v6" podUID="3b9a97fb-54b1-484f-901b-65fe950c1956" Dec 13 15:29:33.350023 kubelet[1908]: E1213 15:29:33.350002 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:33.366908 env[1553]: time="2024-12-13T15:29:33.366866545Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:33.367383 env[1553]: time="2024-12-13T15:29:33.367337627Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:33.368140 env[1553]: time="2024-12-13T15:29:33.368088285Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:33.369235 env[1553]: time="2024-12-13T15:29:33.369194783Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:33.369495 env[1553]: time="2024-12-13T15:29:33.369454082Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 15:29:33.370852 env[1553]: time="2024-12-13T15:29:33.370819826Z" level=info msg="CreateContainer within sandbox \"6639f6bdc0e6c08dbe4d97a20428b2ac41dce1249821d49adc23fe85611ce8d7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 15:29:33.377212 env[1553]: time="2024-12-13T15:29:33.377166151Z" level=info msg="CreateContainer within sandbox \"6639f6bdc0e6c08dbe4d97a20428b2ac41dce1249821d49adc23fe85611ce8d7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a7ec52c399cdc0305495c0c8c422c74e074901dc9170772d86baa577ddd29bff\"" Dec 13 15:29:33.377492 env[1553]: time="2024-12-13T15:29:33.377453579Z" level=info msg="StartContainer for \"a7ec52c399cdc0305495c0c8c422c74e074901dc9170772d86baa577ddd29bff\"" Dec 13 15:29:33.387436 systemd[1]: Started cri-containerd-a7ec52c399cdc0305495c0c8c422c74e074901dc9170772d86baa577ddd29bff.scope. Dec 13 15:29:33.393000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.421447 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 15:29:33.421513 kernel: audit: type=1400 audit(1734103773.393:499): avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe2f4426d88 items=0 ppid=1983 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:33.582419 kernel: audit: type=1300 audit(1734103773.393:499): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe2f4426d88 items=0 ppid=1983 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:33.582448 kernel: audit: type=1327 audit(1734103773.393:499): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137656335326333393963646330333035343935633063386334323263 Dec 13 15:29:33.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137656335326333393963646330333035343935633063386334323263 Dec 13 15:29:33.675691 kernel: audit: type=1400 audit(1734103773.393:500): avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.739093 kernel: audit: type=1400 audit(1734103773.393:500): avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.802519 kernel: audit: type=1400 audit(1734103773.393:500): avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.865848 kernel: audit: type=1400 audit(1734103773.393:500): avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.929616 kernel: audit: type=1400 audit(1734103773.393:500): avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.935771 env[1553]: time="2024-12-13T15:29:33.935745397Z" level=info msg="StartContainer for \"a7ec52c399cdc0305495c0c8c422c74e074901dc9170772d86baa577ddd29bff\" returns successfully" Dec 13 15:29:33.993349 kernel: audit: type=1400 audit(1734103773.393:500): avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:34.057020 kernel: audit: type=1400 audit(1734103773.393:500): avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.393000 audit: BPF prog-id=69 op=LOAD Dec 13 15:29:33.393000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000949a8 items=0 ppid=1983 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:33.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137656335326333393963646330333035343935633063386334323263 Dec 13 15:29:33.484000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.484000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.484000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.484000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.484000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.484000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.484000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.484000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.484000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.484000 audit: BPF prog-id=70 op=LOAD Dec 13 15:29:33.484000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000949f8 items=0 ppid=1983 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:33.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137656335326333393963646330333035343935633063386334323263 Dec 13 15:29:33.674000 audit: BPF prog-id=70 op=UNLOAD Dec 13 15:29:33.675000 audit: BPF prog-id=69 op=UNLOAD Dec 13 15:29:33.675000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.675000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.675000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.675000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.675000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.675000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.675000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.675000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.675000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.675000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:33.675000 audit: BPF prog-id=71 op=LOAD Dec 13 15:29:33.675000 audit[2301]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000094a88 items=0 ppid=1983 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:33.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137656335326333393963646330333035343935633063386334323263 Dec 13 15:29:34.350682 kubelet[1908]: E1213 15:29:34.350589 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:34.498343 kubelet[1908]: E1213 15:29:34.498259 1908 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-db4v6" podUID="3b9a97fb-54b1-484f-901b-65fe950c1956" Dec 13 15:29:34.716805 systemd[1]: cri-containerd-a7ec52c399cdc0305495c0c8c422c74e074901dc9170772d86baa577ddd29bff.scope: Deactivated successfully. Dec 13 15:29:34.717522 systemd[1]: cri-containerd-a7ec52c399cdc0305495c0c8c422c74e074901dc9170772d86baa577ddd29bff.scope: Consumed 1.008s CPU time. Dec 13 15:29:34.733000 audit: BPF prog-id=71 op=UNLOAD Dec 13 15:29:34.758748 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a7ec52c399cdc0305495c0c8c422c74e074901dc9170772d86baa577ddd29bff-rootfs.mount: Deactivated successfully. Dec 13 15:29:34.775253 kubelet[1908]: I1213 15:29:34.775164 1908 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 15:29:35.351131 kubelet[1908]: E1213 15:29:35.351021 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:35.503364 env[1553]: time="2024-12-13T15:29:35.503198452Z" level=info msg="shim disconnected" id=a7ec52c399cdc0305495c0c8c422c74e074901dc9170772d86baa577ddd29bff Dec 13 15:29:35.503364 env[1553]: time="2024-12-13T15:29:35.503332691Z" level=warning msg="cleaning up after shim disconnected" id=a7ec52c399cdc0305495c0c8c422c74e074901dc9170772d86baa577ddd29bff namespace=k8s.io Dec 13 15:29:35.503364 env[1553]: time="2024-12-13T15:29:35.503369500Z" level=info msg="cleaning up dead shim" Dec 13 15:29:35.516587 env[1553]: time="2024-12-13T15:29:35.516550598Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:29:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2352 runtime=io.containerd.runc.v2\n" Dec 13 15:29:35.531246 env[1553]: time="2024-12-13T15:29:35.531202747Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 15:29:36.351555 kubelet[1908]: E1213 15:29:36.351447 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:36.511738 systemd[1]: Created slice kubepods-besteffort-pod3b9a97fb_54b1_484f_901b_65fe950c1956.slice. Dec 13 15:29:36.516694 env[1553]: time="2024-12-13T15:29:36.516589857Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-db4v6,Uid:3b9a97fb-54b1-484f-901b-65fe950c1956,Namespace:calico-system,Attempt:0,}" Dec 13 15:29:36.554547 env[1553]: time="2024-12-13T15:29:36.554473907Z" level=error msg="Failed to destroy network for sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:29:36.554794 env[1553]: time="2024-12-13T15:29:36.554741400Z" level=error msg="encountered an error cleaning up failed sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:29:36.554842 env[1553]: time="2024-12-13T15:29:36.554782885Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-db4v6,Uid:3b9a97fb-54b1-484f-901b-65fe950c1956,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:29:36.554973 kubelet[1908]: E1213 15:29:36.554953 1908 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:29:36.555022 kubelet[1908]: E1213 15:29:36.554993 1908 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-db4v6" Dec 13 15:29:36.555022 kubelet[1908]: E1213 15:29:36.555009 1908 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-db4v6" Dec 13 15:29:36.555073 kubelet[1908]: E1213 15:29:36.555038 1908 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-db4v6_calico-system(3b9a97fb-54b1-484f-901b-65fe950c1956)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-db4v6_calico-system(3b9a97fb-54b1-484f-901b-65fe950c1956)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-db4v6" podUID="3b9a97fb-54b1-484f-901b-65fe950c1956" Dec 13 15:29:36.555601 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f-shm.mount: Deactivated successfully. Dec 13 15:29:37.352387 kubelet[1908]: E1213 15:29:37.352267 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:37.534248 kubelet[1908]: I1213 15:29:37.534193 1908 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:29:37.534625 env[1553]: time="2024-12-13T15:29:37.534562377Z" level=info msg="StopPodSandbox for \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\"" Dec 13 15:29:37.552213 env[1553]: time="2024-12-13T15:29:37.552110968Z" level=error msg="StopPodSandbox for \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\" failed" error="failed to destroy network for sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:29:37.552319 kubelet[1908]: E1213 15:29:37.552295 1908 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:29:37.552406 kubelet[1908]: E1213 15:29:37.552340 1908 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f"} Dec 13 15:29:37.552406 kubelet[1908]: E1213 15:29:37.552388 1908 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3b9a97fb-54b1-484f-901b-65fe950c1956\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:29:37.552472 kubelet[1908]: E1213 15:29:37.552402 1908 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3b9a97fb-54b1-484f-901b-65fe950c1956\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-db4v6" podUID="3b9a97fb-54b1-484f-901b-65fe950c1956" Dec 13 15:29:38.352917 kubelet[1908]: E1213 15:29:38.352846 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:39.353083 kubelet[1908]: E1213 15:29:39.353018 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:39.917217 systemd[1]: Created slice kubepods-besteffort-podacc911b9_6906_4c9a_aa58_cf3b33bb4dc0.slice. Dec 13 15:29:39.970775 kubelet[1908]: I1213 15:29:39.970759 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8hzsg\" (UniqueName: \"kubernetes.io/projected/acc911b9-6906-4c9a-aa58-cf3b33bb4dc0-kube-api-access-8hzsg\") pod \"nginx-deployment-8587fbcb89-pf4tc\" (UID: \"acc911b9-6906-4c9a-aa58-cf3b33bb4dc0\") " pod="default/nginx-deployment-8587fbcb89-pf4tc" Dec 13 15:29:40.218806 env[1553]: time="2024-12-13T15:29:40.218703322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-pf4tc,Uid:acc911b9-6906-4c9a-aa58-cf3b33bb4dc0,Namespace:default,Attempt:0,}" Dec 13 15:29:40.249928 env[1553]: time="2024-12-13T15:29:40.249869770Z" level=error msg="Failed to destroy network for sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:29:40.250192 env[1553]: time="2024-12-13T15:29:40.250152737Z" level=error msg="encountered an error cleaning up failed sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:29:40.250232 env[1553]: time="2024-12-13T15:29:40.250198585Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-pf4tc,Uid:acc911b9-6906-4c9a-aa58-cf3b33bb4dc0,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:29:40.250511 kubelet[1908]: E1213 15:29:40.250458 1908 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:29:40.250544 kubelet[1908]: E1213 15:29:40.250509 1908 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-pf4tc" Dec 13 15:29:40.250544 kubelet[1908]: E1213 15:29:40.250524 1908 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-pf4tc" Dec 13 15:29:40.250587 kubelet[1908]: E1213 15:29:40.250551 1908 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-pf4tc_default(acc911b9-6906-4c9a-aa58-cf3b33bb4dc0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-pf4tc_default(acc911b9-6906-4c9a-aa58-cf3b33bb4dc0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-pf4tc" podUID="acc911b9-6906-4c9a-aa58-cf3b33bb4dc0" Dec 13 15:29:40.251780 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f-shm.mount: Deactivated successfully. Dec 13 15:29:40.353702 kubelet[1908]: E1213 15:29:40.353680 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:40.539494 kubelet[1908]: I1213 15:29:40.539480 1908 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:29:40.539828 env[1553]: time="2024-12-13T15:29:40.539793709Z" level=info msg="StopPodSandbox for \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\"" Dec 13 15:29:40.553810 env[1553]: time="2024-12-13T15:29:40.553634818Z" level=error msg="StopPodSandbox for \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\" failed" error="failed to destroy network for sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:29:40.554259 kubelet[1908]: E1213 15:29:40.554195 1908 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:29:40.554351 kubelet[1908]: E1213 15:29:40.554288 1908 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f"} Dec 13 15:29:40.554385 kubelet[1908]: E1213 15:29:40.554349 1908 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"acc911b9-6906-4c9a-aa58-cf3b33bb4dc0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:29:40.554661 kubelet[1908]: E1213 15:29:40.554375 1908 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"acc911b9-6906-4c9a-aa58-cf3b33bb4dc0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-pf4tc" podUID="acc911b9-6906-4c9a-aa58-cf3b33bb4dc0" Dec 13 15:29:41.354521 kubelet[1908]: E1213 15:29:41.354475 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:42.262140 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2434633429.mount: Deactivated successfully. Dec 13 15:29:42.282897 env[1553]: time="2024-12-13T15:29:42.282851408Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:42.283526 env[1553]: time="2024-12-13T15:29:42.283513742Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:42.284225 env[1553]: time="2024-12-13T15:29:42.284214291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:42.284916 env[1553]: time="2024-12-13T15:29:42.284891241Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:42.285244 env[1553]: time="2024-12-13T15:29:42.285216515Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 15:29:42.289347 env[1553]: time="2024-12-13T15:29:42.289305801Z" level=info msg="CreateContainer within sandbox \"6639f6bdc0e6c08dbe4d97a20428b2ac41dce1249821d49adc23fe85611ce8d7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 15:29:42.294800 env[1553]: time="2024-12-13T15:29:42.294783994Z" level=info msg="CreateContainer within sandbox \"6639f6bdc0e6c08dbe4d97a20428b2ac41dce1249821d49adc23fe85611ce8d7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6bd79900456d0515c590e8a12a11f7298e6565b434a6ca4abc1ca2aefafec8e1\"" Dec 13 15:29:42.295109 env[1553]: time="2024-12-13T15:29:42.295079862Z" level=info msg="StartContainer for \"6bd79900456d0515c590e8a12a11f7298e6565b434a6ca4abc1ca2aefafec8e1\"" Dec 13 15:29:42.304037 systemd[1]: Started cri-containerd-6bd79900456d0515c590e8a12a11f7298e6565b434a6ca4abc1ca2aefafec8e1.scope. Dec 13 15:29:42.311000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.340090 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 15:29:42.340172 kernel: audit: type=1400 audit(1734103782.311:506): avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.355584 kubelet[1908]: E1213 15:29:42.355564 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:42.311000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7effbffdc198 items=0 ppid=1983 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:42.501493 kernel: audit: type=1300 audit(1734103782.311:506): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7effbffdc198 items=0 ppid=1983 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:42.501528 kernel: audit: type=1327 audit(1734103782.311:506): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643739393030343536643035313563353930653861313261313166 Dec 13 15:29:42.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643739393030343536643035313563353930653861313261313166 Dec 13 15:29:42.594865 kernel: audit: type=1400 audit(1734103782.311:507): avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.311000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.658396 kernel: audit: type=1400 audit(1734103782.311:507): avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.311000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.721954 kernel: audit: type=1400 audit(1734103782.311:507): avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.311000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.785525 kernel: audit: type=1400 audit(1734103782.311:507): avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.311000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.849448 kernel: audit: type=1400 audit(1734103782.311:507): avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.311000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.855107 env[1553]: time="2024-12-13T15:29:42.855079832Z" level=info msg="StartContainer for \"6bd79900456d0515c590e8a12a11f7298e6565b434a6ca4abc1ca2aefafec8e1\" returns successfully" Dec 13 15:29:42.913378 kernel: audit: type=1400 audit(1734103782.311:507): avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.311000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.977424 kernel: audit: type=1400 audit(1734103782.311:507): avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.311000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.311000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.311000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.311000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.311000 audit: BPF prog-id=72 op=LOAD Dec 13 15:29:42.311000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cdc88 items=0 ppid=1983 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:42.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643739393030343536643035313563353930653861313261313166 Dec 13 15:29:42.499000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.499000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.499000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.499000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.499000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.499000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.499000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.499000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.499000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.499000 audit: BPF prog-id=73 op=LOAD Dec 13 15:29:42.499000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002cdcd8 items=0 ppid=1983 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:42.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643739393030343536643035313563353930653861313261313166 Dec 13 15:29:42.657000 audit: BPF prog-id=73 op=UNLOAD Dec 13 15:29:42.657000 audit: BPF prog-id=72 op=UNLOAD Dec 13 15:29:42.657000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.657000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.657000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.657000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.657000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.657000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.657000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.657000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.657000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.657000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:42.657000 audit: BPF prog-id=74 op=LOAD Dec 13 15:29:42.657000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002cdd68 items=0 ppid=1983 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:42.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643739393030343536643035313563353930653861313261313166 Dec 13 15:29:43.125288 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 15:29:43.125322 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 15:29:43.343864 kubelet[1908]: E1213 15:29:43.343786 1908 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:43.355885 kubelet[1908]: E1213 15:29:43.355826 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:44.356353 kubelet[1908]: E1213 15:29:44.356232 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:44.436000 audit[2652]: AVC avc: denied { write } for pid=2652 comm="tee" name="fd" dev="proc" ino=21975 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:29:44.436000 audit[2647]: AVC avc: denied { write } for pid=2647 comm="tee" name="fd" dev="proc" ino=17051 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:29:44.436000 audit[2652]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5cba2a21 a2=241 a3=1b6 items=1 ppid=2617 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.436000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 15:29:44.436000 audit[2647]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7a202a21 a2=241 a3=1b6 items=1 ppid=2614 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.436000 audit: PATH item=0 name="/dev/fd/63" inode=32996 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:44.436000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 15:29:44.436000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:29:44.436000 audit: PATH item=0 name="/dev/fd/63" inode=17048 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:44.436000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:29:44.436000 audit[2650]: AVC avc: denied { write } for pid=2650 comm="tee" name="fd" dev="proc" ino=20838 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:29:44.436000 audit[2650]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6210ba23 a2=241 a3=1b6 items=1 ppid=2616 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.436000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 15:29:44.436000 audit: PATH item=0 name="/dev/fd/63" inode=20835 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:44.436000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:29:44.436000 audit[2655]: AVC avc: denied { write } for pid=2655 comm="tee" name="fd" dev="proc" ino=30034 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:29:44.436000 audit[2655]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde3f9aa22 a2=241 a3=1b6 items=1 ppid=2615 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.436000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 15:29:44.436000 audit: PATH item=0 name="/dev/fd/63" inode=30031 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:44.436000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:29:44.436000 audit[2657]: AVC avc: denied { write } for pid=2657 comm="tee" name="fd" dev="proc" ino=31286 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:29:44.436000 audit[2657]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdafae0a21 a2=241 a3=1b6 items=1 ppid=2618 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.436000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 15:29:44.436000 audit: PATH item=0 name="/dev/fd/63" inode=31283 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:44.436000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:29:44.436000 audit[2661]: AVC avc: denied { write } for pid=2661 comm="tee" name="fd" dev="proc" ino=14825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:29:44.436000 audit[2661]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8591da11 a2=241 a3=1b6 items=1 ppid=2613 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.436000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 15:29:44.436000 audit: PATH item=0 name="/dev/fd/63" inode=14822 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:44.436000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:29:44.437000 audit[2659]: AVC avc: denied { write } for pid=2659 comm="tee" name="fd" dev="proc" ino=21979 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:29:44.437000 audit[2659]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef2a8ea12 a2=241 a3=1b6 items=1 ppid=2619 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.437000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 15:29:44.437000 audit: PATH item=0 name="/dev/fd/63" inode=21972 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:29:44.437000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:29:44.492000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.492000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.492000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.492000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.492000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.492000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.492000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.492000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.492000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.492000 audit: BPF prog-id=75 op=LOAD Dec 13 15:29:44.492000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff447603f0 a2=98 a3=3 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.492000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.492000 audit: BPF prog-id=75 op=UNLOAD Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit: BPF prog-id=76 op=LOAD Dec 13 15:29:44.493000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff447601d0 a2=74 a3=540051 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.493000 audit: BPF prog-id=76 op=UNLOAD Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.493000 audit: BPF prog-id=77 op=LOAD Dec 13 15:29:44.493000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff44760200 a2=94 a3=2 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.493000 audit: BPF prog-id=77 op=UNLOAD Dec 13 15:29:44.549610 kubelet[1908]: I1213 15:29:44.549594 1908 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:29:44.573000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.573000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.573000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.573000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.573000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.573000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.573000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.573000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.573000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.573000 audit: BPF prog-id=78 op=LOAD Dec 13 15:29:44.573000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff447600c0 a2=40 a3=1 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.573000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.573000 audit: BPF prog-id=78 op=UNLOAD Dec 13 15:29:44.573000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.573000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff44760190 a2=50 a3=7fff44760270 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.573000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff447600d0 a2=28 a3=0 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff44760100 a2=28 a3=0 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff44760010 a2=28 a3=0 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff44760120 a2=28 a3=0 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff44760100 a2=28 a3=0 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff447600f0 a2=28 a3=0 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff44760120 a2=28 a3=0 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff44760100 a2=28 a3=0 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff44760120 a2=28 a3=0 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff447600f0 a2=28 a3=0 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff44760160 a2=28 a3=0 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff4475ff10 a2=50 a3=1 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit: BPF prog-id=79 op=LOAD Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4475ff10 a2=94 a3=5 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit: BPF prog-id=79 op=UNLOAD Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff4475ffc0 a2=50 a3=1 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff447600e0 a2=4 a3=38 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { confidentiality } for pid=2760 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff44760130 a2=94 a3=6 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { confidentiality } for pid=2760 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff4475f8e0 a2=94 a3=83 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.580000 audit[2760]: AVC avc: denied { confidentiality } for pid=2760 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:29:44.580000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff4475f8e0 a2=94 a3=83 items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit: BPF prog-id=80 op=LOAD Dec 13 15:29:44.584000 audit[2772]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce1560bc0 a2=98 a3=1999999999999999 items=0 ppid=2621 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.584000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:29:44.584000 audit: BPF prog-id=80 op=UNLOAD Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit: BPF prog-id=81 op=LOAD Dec 13 15:29:44.584000 audit[2772]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce1560aa0 a2=74 a3=ffff items=0 ppid=2621 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.584000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:29:44.584000 audit: BPF prog-id=81 op=UNLOAD Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.584000 audit: BPF prog-id=82 op=LOAD Dec 13 15:29:44.584000 audit[2772]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce1560ae0 a2=40 a3=7ffce1560cc0 items=0 ppid=2621 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.584000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:29:44.584000 audit: BPF prog-id=82 op=UNLOAD Dec 13 15:29:44.614140 systemd-networkd[1306]: vxlan.calico: Link UP Dec 13 15:29:44.614143 systemd-networkd[1306]: vxlan.calico: Gained carrier Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit: BPF prog-id=83 op=LOAD Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc744c29e0 a2=98 a3=ffffffff items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit: BPF prog-id=83 op=UNLOAD Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit: BPF prog-id=84 op=LOAD Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc744c27f0 a2=74 a3=540051 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit: BPF prog-id=84 op=UNLOAD Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit: BPF prog-id=85 op=LOAD Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc744c2820 a2=94 a3=2 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit: BPF prog-id=85 op=UNLOAD Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc744c26f0 a2=28 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc744c2720 a2=28 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc744c2630 a2=28 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc744c2740 a2=28 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc744c2720 a2=28 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc744c2710 a2=28 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc744c2740 a2=28 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc744c2720 a2=28 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc744c2740 a2=28 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc744c2710 a2=28 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.630000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.630000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc744c2780 a2=28 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.630000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit: BPF prog-id=86 op=LOAD Dec 13 15:29:44.631000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc744c25f0 a2=40 a3=0 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.631000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.631000 audit: BPF prog-id=86 op=UNLOAD Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc744c25e0 a2=50 a3=2800 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.631000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc744c25e0 a2=50 a3=2800 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.631000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit: BPF prog-id=87 op=LOAD Dec 13 15:29:44.631000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc744c1e00 a2=94 a3=2 items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.631000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.631000 audit: BPF prog-id=87 op=UNLOAD Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.631000 audit: BPF prog-id=88 op=LOAD Dec 13 15:29:44.631000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc744c1f00 a2=94 a3=2d items=0 ppid=2621 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.631000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit: BPF prog-id=89 op=LOAD Dec 13 15:29:44.632000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0564b910 a2=98 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.632000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.632000 audit: BPF prog-id=89 op=UNLOAD Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit: BPF prog-id=90 op=LOAD Dec 13 15:29:44.632000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0564b6f0 a2=74 a3=540051 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.632000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.632000 audit: BPF prog-id=90 op=UNLOAD Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.632000 audit: BPF prog-id=91 op=LOAD Dec 13 15:29:44.632000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0564b720 a2=94 a3=2 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.632000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.632000 audit: BPF prog-id=91 op=UNLOAD Dec 13 15:29:44.713000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.713000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.713000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.713000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.713000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.713000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.713000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.713000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.713000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.713000 audit: BPF prog-id=92 op=LOAD Dec 13 15:29:44.713000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0564b5e0 a2=40 a3=1 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.713000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.713000 audit: BPF prog-id=92 op=UNLOAD Dec 13 15:29:44.713000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.713000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe0564b6b0 a2=50 a3=7ffe0564b790 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.713000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0564b5f0 a2=28 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0564b620 a2=28 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0564b530 a2=28 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0564b640 a2=28 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0564b620 a2=28 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0564b610 a2=28 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0564b640 a2=28 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0564b620 a2=28 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0564b640 a2=28 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0564b610 a2=28 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0564b680 a2=28 a3=0 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe0564b430 a2=50 a3=1 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit: BPF prog-id=93 op=LOAD Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe0564b430 a2=94 a3=5 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit: BPF prog-id=93 op=UNLOAD Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe0564b4e0 a2=50 a3=1 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe0564b600 a2=4 a3=38 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { confidentiality } for pid=2803 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe0564b650 a2=94 a3=6 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { confidentiality } for pid=2803 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe0564ae00 a2=94 a3=83 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.720000 audit[2803]: AVC avc: denied { confidentiality } for pid=2803 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:29:44.720000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe0564ae00 a2=94 a3=83 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.721000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.721000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0564c840 a2=10 a3=f1f00800 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.721000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.721000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.721000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0564c6e0 a2=10 a3=3 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.721000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.721000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.721000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0564c680 a2=10 a3=3 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.721000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.721000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:44.721000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0564c680 a2=10 a3=7 items=0 ppid=2621 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.721000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:29:44.728000 audit: BPF prog-id=88 op=UNLOAD Dec 13 15:29:44.760000 audit[2859]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2859 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:29:44.760000 audit[2859]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcfcc1a530 a2=0 a3=7ffcfcc1a51c items=0 ppid=2621 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.760000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:29:44.765000 audit[2861]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2861 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:29:44.765000 audit[2861]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffceeb7cef0 a2=0 a3=7ffceeb7cedc items=0 ppid=2621 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.765000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:29:44.765000 audit[2862]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2862 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:29:44.765000 audit[2862]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffda9a501e0 a2=0 a3=7ffda9a501cc items=0 ppid=2621 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.765000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:29:44.767000 audit[2858]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2858 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:29:44.767000 audit[2858]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc98990310 a2=0 a3=7ffc989902fc items=0 ppid=2621 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:44.767000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:29:45.357486 kubelet[1908]: E1213 15:29:45.357370 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:45.994477 systemd-networkd[1306]: vxlan.calico: Gained IPv6LL Dec 13 15:29:46.358518 kubelet[1908]: E1213 15:29:46.358407 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:47.359521 kubelet[1908]: E1213 15:29:47.359394 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:47.934246 update_engine[1549]: I1213 15:29:47.934123 1549 update_attempter.cc:509] Updating boot flags... Dec 13 15:29:48.360277 kubelet[1908]: E1213 15:29:48.360144 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:49.361538 kubelet[1908]: E1213 15:29:49.361416 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:50.362056 kubelet[1908]: E1213 15:29:50.361926 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:51.362542 kubelet[1908]: E1213 15:29:51.362426 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:51.700340 kubelet[1908]: I1213 15:29:51.700129 1908 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:29:51.759480 kubelet[1908]: I1213 15:29:51.759452 1908 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-rsr7v" podStartSLOduration=11.852412586 podStartE2EDuration="28.759441434s" podCreationTimestamp="2024-12-13 15:29:23 +0000 UTC" firstStartedPulling="2024-12-13 15:29:25.378780832 +0000 UTC m=+2.328461019" lastFinishedPulling="2024-12-13 15:29:42.285809681 +0000 UTC m=+19.235489867" observedRunningTime="2024-12-13 15:29:43.568544209 +0000 UTC m=+20.518224451" watchObservedRunningTime="2024-12-13 15:29:51.759441434 +0000 UTC m=+28.709121622" Dec 13 15:29:52.363407 kubelet[1908]: E1213 15:29:52.363293 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:52.499576 env[1553]: time="2024-12-13T15:29:52.499450130Z" level=info msg="StopPodSandbox for \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\"" Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.556 [INFO][2968] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.556 [INFO][2968] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" iface="eth0" netns="/var/run/netns/cni-80d34987-7a8e-7be5-82bc-2fe3ae758966" Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.556 [INFO][2968] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" iface="eth0" netns="/var/run/netns/cni-80d34987-7a8e-7be5-82bc-2fe3ae758966" Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.556 [INFO][2968] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" iface="eth0" netns="/var/run/netns/cni-80d34987-7a8e-7be5-82bc-2fe3ae758966" Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.556 [INFO][2968] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.556 [INFO][2968] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.571 [INFO][2981] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" HandleID="k8s-pod-network.2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.571 [INFO][2981] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.571 [INFO][2981] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.582 [WARNING][2981] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" HandleID="k8s-pod-network.2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.582 [INFO][2981] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" HandleID="k8s-pod-network.2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.585 [INFO][2981] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:29:52.589220 env[1553]: 2024-12-13 15:29:52.587 [INFO][2968] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:29:52.589824 env[1553]: time="2024-12-13T15:29:52.589321403Z" level=info msg="TearDown network for sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\" successfully" Dec 13 15:29:52.589824 env[1553]: time="2024-12-13T15:29:52.589356242Z" level=info msg="StopPodSandbox for \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\" returns successfully" Dec 13 15:29:52.589910 env[1553]: time="2024-12-13T15:29:52.589880270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-db4v6,Uid:3b9a97fb-54b1-484f-901b-65fe950c1956,Namespace:calico-system,Attempt:1,}" Dec 13 15:29:52.591489 systemd[1]: run-netns-cni\x2d80d34987\x2d7a8e\x2d7be5\x2d82bc\x2d2fe3ae758966.mount: Deactivated successfully. Dec 13 15:29:52.770240 systemd-networkd[1306]: cali2c805789ba6: Link UP Dec 13 15:29:52.827091 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:29:52.827164 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2c805789ba6: link becomes ready Dec 13 15:29:52.827136 systemd-networkd[1306]: cali2c805789ba6: Gained carrier Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.623 [INFO][2997] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-csi--node--driver--db4v6-eth0 csi-node-driver- calico-system 3b9a97fb-54b1-484f-901b-65fe950c1956 1635 0 2024-12-13 15:29:23 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.80.21 csi-node-driver-db4v6 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali2c805789ba6 [] []}} ContainerID="f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" Namespace="calico-system" Pod="csi-node-driver-db4v6" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--db4v6-" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.623 [INFO][2997] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" Namespace="calico-system" Pod="csi-node-driver-db4v6" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.682 [INFO][3015] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" HandleID="k8s-pod-network.f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.703 [INFO][3015] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" HandleID="k8s-pod-network.f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0006a31d0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.21", "pod":"csi-node-driver-db4v6", "timestamp":"2024-12-13 15:29:52.682874335 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.703 [INFO][3015] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.703 [INFO][3015] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.703 [INFO][3015] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.708 [INFO][3015] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" host="10.67.80.21" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.718 [INFO][3015] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.728 [INFO][3015] ipam/ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.733 [INFO][3015] ipam/ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.739 [INFO][3015] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.739 [INFO][3015] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" host="10.67.80.21" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.743 [INFO][3015] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6 Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.752 [INFO][3015] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" host="10.67.80.21" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.762 [INFO][3015] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.115.1/26] block=192.168.115.0/26 handle="k8s-pod-network.f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" host="10.67.80.21" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.762 [INFO][3015] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.1/26] handle="k8s-pod-network.f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" host="10.67.80.21" Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.762 [INFO][3015] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:29:52.845915 env[1553]: 2024-12-13 15:29:52.762 [INFO][3015] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.115.1/26] IPv6=[] ContainerID="f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" HandleID="k8s-pod-network.f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:29:52.846429 env[1553]: 2024-12-13 15:29:52.767 [INFO][2997] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" Namespace="calico-system" Pod="csi-node-driver-db4v6" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-csi--node--driver--db4v6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3b9a97fb-54b1-484f-901b-65fe950c1956", ResourceVersion:"1635", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 29, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"csi-node-driver-db4v6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.115.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2c805789ba6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:29:52.846429 env[1553]: 2024-12-13 15:29:52.767 [INFO][2997] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.115.1/32] ContainerID="f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" Namespace="calico-system" Pod="csi-node-driver-db4v6" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:29:52.846429 env[1553]: 2024-12-13 15:29:52.767 [INFO][2997] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2c805789ba6 ContainerID="f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" Namespace="calico-system" Pod="csi-node-driver-db4v6" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:29:52.846429 env[1553]: 2024-12-13 15:29:52.827 [INFO][2997] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" Namespace="calico-system" Pod="csi-node-driver-db4v6" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:29:52.846429 env[1553]: 2024-12-13 15:29:52.827 [INFO][2997] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" Namespace="calico-system" Pod="csi-node-driver-db4v6" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-csi--node--driver--db4v6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3b9a97fb-54b1-484f-901b-65fe950c1956", ResourceVersion:"1635", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 29, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6", Pod:"csi-node-driver-db4v6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.115.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2c805789ba6", MAC:"1e:5f:8d:b5:69:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:29:52.846429 env[1553]: 2024-12-13 15:29:52.845 [INFO][2997] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6" Namespace="calico-system" Pod="csi-node-driver-db4v6" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:29:52.851512 env[1553]: time="2024-12-13T15:29:52.851476669Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:29:52.851512 env[1553]: time="2024-12-13T15:29:52.851500711Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:29:52.851512 env[1553]: time="2024-12-13T15:29:52.851507567Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:29:52.851640 env[1553]: time="2024-12-13T15:29:52.851589494Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6 pid=3057 runtime=io.containerd.runc.v2 Dec 13 15:29:52.851000 audit[3058]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=3058 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:29:52.859605 systemd[1]: Started cri-containerd-f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6.scope. Dec 13 15:29:52.878008 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 15:29:52.878069 kernel: audit: type=1325 audit(1734103792.851:614): table=filter:69 family=2 entries=34 op=nft_register_chain pid=3058 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:29:52.851000 audit[3058]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff9aae3820 a2=0 a3=7fff9aae380c items=0 ppid=2621 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.031639 kernel: audit: type=1300 audit(1734103792.851:614): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff9aae3820 a2=0 a3=7fff9aae380c items=0 ppid=2621 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.031730 kernel: audit: type=1327 audit(1734103792.851:614): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:29:52.851000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:29:52.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.154585 kernel: audit: type=1400 audit(1734103792.942:615): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.154645 kernel: audit: type=1400 audit(1734103792.942:616): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:52.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:52.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.279139 kernel: audit: type=1400 audit(1734103792.942:617): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.279192 kernel: audit: type=1400 audit(1734103792.942:618): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:52.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:52.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.363990 kubelet[1908]: E1213 15:29:53.363966 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:53.404305 kernel: audit: type=1400 audit(1734103792.942:619): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.404340 kernel: audit: type=1400 audit(1734103792.942:620): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:52.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.466832 kernel: audit: type=1400 audit(1734103792.942:621): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:52.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.498602 env[1553]: time="2024-12-13T15:29:53.498575874Z" level=info msg="StopPodSandbox for \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\"" Dec 13 15:29:52.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:52.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit: BPF prog-id=94 op=LOAD Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3057 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638383831613037616166353964383765386138376437393330346637 Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3057 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638383831613037616166353964383765386138376437393330346637 Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.091000 audit: BPF prog-id=95 op=LOAD Dec 13 15:29:53.091000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0002e8690 items=0 ppid=3057 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638383831613037616166353964383765386138376437393330346637 Dec 13 15:29:53.216000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.216000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.216000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.216000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.216000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.216000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.216000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.216000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.216000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.216000 audit: BPF prog-id=96 op=LOAD Dec 13 15:29:53.216000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0002e86d8 items=0 ppid=3057 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638383831613037616166353964383765386138376437393330346637 Dec 13 15:29:53.341000 audit: BPF prog-id=96 op=UNLOAD Dec 13 15:29:53.341000 audit: BPF prog-id=95 op=UNLOAD Dec 13 15:29:53.341000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.341000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.341000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.341000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.341000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.341000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.341000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.341000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.341000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.341000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.341000 audit: BPF prog-id=97 op=LOAD Dec 13 15:29:53.341000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0002e8ae8 items=0 ppid=3057 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638383831613037616166353964383765386138376437393330346637 Dec 13 15:29:53.534143 env[1553]: time="2024-12-13T15:29:53.534118772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-db4v6,Uid:3b9a97fb-54b1-484f-901b-65fe950c1956,Namespace:calico-system,Attempt:1,} returns sandbox id \"f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6\"" Dec 13 15:29:53.534809 env[1553]: time="2024-12-13T15:29:53.534770469Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.537 [INFO][3099] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.537 [INFO][3099] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" iface="eth0" netns="/var/run/netns/cni-b9874611-7109-04f5-09e3-a9cbd8718447" Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.537 [INFO][3099] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" iface="eth0" netns="/var/run/netns/cni-b9874611-7109-04f5-09e3-a9cbd8718447" Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.537 [INFO][3099] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" iface="eth0" netns="/var/run/netns/cni-b9874611-7109-04f5-09e3-a9cbd8718447" Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.537 [INFO][3099] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.537 [INFO][3099] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.547 [INFO][3118] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" HandleID="k8s-pod-network.6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.547 [INFO][3118] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.547 [INFO][3118] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.552 [WARNING][3118] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" HandleID="k8s-pod-network.6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.552 [INFO][3118] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" HandleID="k8s-pod-network.6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.553 [INFO][3118] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:29:53.554968 env[1553]: 2024-12-13 15:29:53.554 [INFO][3099] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:29:53.555356 env[1553]: time="2024-12-13T15:29:53.555078817Z" level=info msg="TearDown network for sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\" successfully" Dec 13 15:29:53.555356 env[1553]: time="2024-12-13T15:29:53.555109871Z" level=info msg="StopPodSandbox for \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\" returns successfully" Dec 13 15:29:53.555519 env[1553]: time="2024-12-13T15:29:53.555505369Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-pf4tc,Uid:acc911b9-6906-4c9a-aa58-cf3b33bb4dc0,Namespace:default,Attempt:1,}" Dec 13 15:29:53.556211 systemd[1]: run-netns-cni\x2db9874611\x2d7109\x2d04f5\x2d09e3\x2da9cbd8718447.mount: Deactivated successfully. Dec 13 15:29:53.683842 systemd-networkd[1306]: calia982c7b7283: Link UP Dec 13 15:29:53.713065 systemd-networkd[1306]: calia982c7b7283: Gained carrier Dec 13 15:29:53.713669 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia982c7b7283: link becomes ready Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.602 [INFO][3130] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0 nginx-deployment-8587fbcb89- default acc911b9-6906-4c9a-aa58-cf3b33bb4dc0 1641 0 2024-12-13 15:29:39 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.21 nginx-deployment-8587fbcb89-pf4tc eth0 default [] [] [kns.default ksa.default.default] calia982c7b7283 [] []}} ContainerID="165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" Namespace="default" Pod="nginx-deployment-8587fbcb89-pf4tc" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.602 [INFO][3130] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" Namespace="default" Pod="nginx-deployment-8587fbcb89-pf4tc" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.623 [INFO][3153] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" HandleID="k8s-pod-network.165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.632 [INFO][3153] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" HandleID="k8s-pod-network.165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bd610), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.21", "pod":"nginx-deployment-8587fbcb89-pf4tc", "timestamp":"2024-12-13 15:29:53.623727422 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.632 [INFO][3153] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.632 [INFO][3153] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.632 [INFO][3153] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.634 [INFO][3153] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" host="10.67.80.21" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.638 [INFO][3153] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.646 [INFO][3153] ipam/ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.651 [INFO][3153] ipam/ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.655 [INFO][3153] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.655 [INFO][3153] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" host="10.67.80.21" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.658 [INFO][3153] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4 Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.666 [INFO][3153] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" host="10.67.80.21" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.677 [INFO][3153] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.115.2/26] block=192.168.115.0/26 handle="k8s-pod-network.165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" host="10.67.80.21" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.677 [INFO][3153] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.2/26] handle="k8s-pod-network.165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" host="10.67.80.21" Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.677 [INFO][3153] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:29:53.725077 env[1553]: 2024-12-13 15:29:53.677 [INFO][3153] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.115.2/26] IPv6=[] ContainerID="165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" HandleID="k8s-pod-network.165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:29:53.725536 env[1553]: 2024-12-13 15:29:53.680 [INFO][3130] cni-plugin/k8s.go 386: Populated endpoint ContainerID="165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" Namespace="default" Pod="nginx-deployment-8587fbcb89-pf4tc" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"acc911b9-6906-4c9a-aa58-cf3b33bb4dc0", ResourceVersion:"1641", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 29, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-pf4tc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia982c7b7283", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:29:53.725536 env[1553]: 2024-12-13 15:29:53.680 [INFO][3130] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.115.2/32] ContainerID="165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" Namespace="default" Pod="nginx-deployment-8587fbcb89-pf4tc" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:29:53.725536 env[1553]: 2024-12-13 15:29:53.680 [INFO][3130] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia982c7b7283 ContainerID="165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" Namespace="default" Pod="nginx-deployment-8587fbcb89-pf4tc" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:29:53.725536 env[1553]: 2024-12-13 15:29:53.713 [INFO][3130] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" Namespace="default" Pod="nginx-deployment-8587fbcb89-pf4tc" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:29:53.725536 env[1553]: 2024-12-13 15:29:53.713 [INFO][3130] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" Namespace="default" Pod="nginx-deployment-8587fbcb89-pf4tc" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"acc911b9-6906-4c9a-aa58-cf3b33bb4dc0", ResourceVersion:"1641", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 29, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4", Pod:"nginx-deployment-8587fbcb89-pf4tc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia982c7b7283", MAC:"7e:f1:04:45:dc:7e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:29:53.725536 env[1553]: 2024-12-13 15:29:53.724 [INFO][3130] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4" Namespace="default" Pod="nginx-deployment-8587fbcb89-pf4tc" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:29:53.731626 env[1553]: time="2024-12-13T15:29:53.731584799Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:29:53.731626 env[1553]: time="2024-12-13T15:29:53.731605347Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:29:53.731626 env[1553]: time="2024-12-13T15:29:53.731612306Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:29:53.731743 env[1553]: time="2024-12-13T15:29:53.731681329Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4 pid=3188 runtime=io.containerd.runc.v2 Dec 13 15:29:53.730000 audit[3190]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=3190 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:29:53.730000 audit[3190]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffd6453f380 a2=0 a3=7ffd6453f36c items=0 ppid=2621 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.730000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:29:53.737519 systemd[1]: Started cri-containerd-165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4.scope. Dec 13 15:29:53.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit: BPF prog-id=98 op=LOAD Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3188 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136356439396337353064386230323862393564633434383532613434 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3188 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136356439396337353064386230323862393564633434383532613434 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit: BPF prog-id=99 op=LOAD Dec 13 15:29:53.743000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001e7a20 items=0 ppid=3188 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136356439396337353064386230323862393564633434383532613434 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit: BPF prog-id=100 op=LOAD Dec 13 15:29:53.743000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001e7a68 items=0 ppid=3188 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136356439396337353064386230323862393564633434383532613434 Dec 13 15:29:53.743000 audit: BPF prog-id=100 op=UNLOAD Dec 13 15:29:53.743000 audit: BPF prog-id=99 op=UNLOAD Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:53.743000 audit: BPF prog-id=101 op=LOAD Dec 13 15:29:53.743000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001e7e78 items=0 ppid=3188 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136356439396337353064386230323862393564633434383532613434 Dec 13 15:29:53.761481 env[1553]: time="2024-12-13T15:29:53.761453510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-pf4tc,Uid:acc911b9-6906-4c9a-aa58-cf3b33bb4dc0,Namespace:default,Attempt:1,} returns sandbox id \"165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4\"" Dec 13 15:29:53.930028 systemd-networkd[1306]: cali2c805789ba6: Gained IPv6LL Dec 13 15:29:54.364782 kubelet[1908]: E1213 15:29:54.364710 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:55.081963 systemd-networkd[1306]: calia982c7b7283: Gained IPv6LL Dec 13 15:29:55.303118 env[1553]: time="2024-12-13T15:29:55.303058727Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:55.303594 env[1553]: time="2024-12-13T15:29:55.303550492Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:55.304459 env[1553]: time="2024-12-13T15:29:55.304424116Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:55.305055 env[1553]: time="2024-12-13T15:29:55.305008509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:55.305622 env[1553]: time="2024-12-13T15:29:55.305582317Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 15:29:55.306435 env[1553]: time="2024-12-13T15:29:55.306386529Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 15:29:55.306945 env[1553]: time="2024-12-13T15:29:55.306881037Z" level=info msg="CreateContainer within sandbox \"f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 15:29:55.312249 env[1553]: time="2024-12-13T15:29:55.312211392Z" level=info msg="CreateContainer within sandbox \"f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b9fbd261c96427ecba271b8e460bbfd8ee2cdcd7a013ecc763147fd52c364e36\"" Dec 13 15:29:55.312548 env[1553]: time="2024-12-13T15:29:55.312516378Z" level=info msg="StartContainer for \"b9fbd261c96427ecba271b8e460bbfd8ee2cdcd7a013ecc763147fd52c364e36\"" Dec 13 15:29:55.323153 systemd[1]: Started cri-containerd-b9fbd261c96427ecba271b8e460bbfd8ee2cdcd7a013ecc763147fd52c364e36.scope. Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001216b0 a2=3c a3=7f4f6c6462a8 items=0 ppid=3057 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:55.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666264323631633936343237656362613237316238653436306262 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit: BPF prog-id=102 op=LOAD Dec 13 15:29:55.329000 audit[3241]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001219d8 a2=78 a3=c000273f68 items=0 ppid=3057 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:55.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666264323631633936343237656362613237316238653436306262 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit: BPF prog-id=103 op=LOAD Dec 13 15:29:55.329000 audit[3241]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000121770 a2=78 a3=c000273fb8 items=0 ppid=3057 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:55.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666264323631633936343237656362613237316238653436306262 Dec 13 15:29:55.329000 audit: BPF prog-id=103 op=UNLOAD Dec 13 15:29:55.329000 audit: BPF prog-id=102 op=UNLOAD Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { perfmon } for pid=3241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit[3241]: AVC avc: denied { bpf } for pid=3241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:55.329000 audit: BPF prog-id=104 op=LOAD Dec 13 15:29:55.329000 audit[3241]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000121c30 a2=78 a3=c0003de048 items=0 ppid=3057 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:55.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666264323631633936343237656362613237316238653436306262 Dec 13 15:29:55.336597 env[1553]: time="2024-12-13T15:29:55.336539161Z" level=info msg="StartContainer for \"b9fbd261c96427ecba271b8e460bbfd8ee2cdcd7a013ecc763147fd52c364e36\" returns successfully" Dec 13 15:29:55.365316 kubelet[1908]: E1213 15:29:55.365272 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:56.365838 kubelet[1908]: E1213 15:29:56.365760 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:57.366191 kubelet[1908]: E1213 15:29:57.366129 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:57.532119 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount977408607.mount: Deactivated successfully. Dec 13 15:29:58.367113 kubelet[1908]: E1213 15:29:58.367067 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:58.537812 env[1553]: time="2024-12-13T15:29:58.537757444Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:58.538333 env[1553]: time="2024-12-13T15:29:58.538282799Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:58.539631 env[1553]: time="2024-12-13T15:29:58.539589233Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:58.540327 env[1553]: time="2024-12-13T15:29:58.540284232Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:29:58.541127 env[1553]: time="2024-12-13T15:29:58.541081235Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 15:29:58.541544 env[1553]: time="2024-12-13T15:29:58.541509556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 15:29:58.542088 env[1553]: time="2024-12-13T15:29:58.542014253Z" level=info msg="CreateContainer within sandbox \"165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 15:29:58.547489 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount442249957.mount: Deactivated successfully. Dec 13 15:29:58.564321 env[1553]: time="2024-12-13T15:29:58.564202129Z" level=info msg="CreateContainer within sandbox \"165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"912740dd7b263ffb380f3d54d64f14d5e48860a090d3142b4bcafa83cbaa79b2\"" Dec 13 15:29:58.565142 env[1553]: time="2024-12-13T15:29:58.565037444Z" level=info msg="StartContainer for \"912740dd7b263ffb380f3d54d64f14d5e48860a090d3142b4bcafa83cbaa79b2\"" Dec 13 15:29:58.586008 systemd[1]: Started cri-containerd-912740dd7b263ffb380f3d54d64f14d5e48860a090d3142b4bcafa83cbaa79b2.scope. Dec 13 15:29:58.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.618109 kernel: kauditd_printk_skb: 153 callbacks suppressed Dec 13 15:29:58.618195 kernel: audit: type=1400 audit(1734103798.590:658): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.743125 kernel: audit: type=1400 audit(1734103798.590:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.743172 kernel: audit: type=1400 audit(1734103798.590:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.867465 kernel: audit: type=1400 audit(1734103798.590:661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.867515 kernel: audit: type=1400 audit(1734103798.590:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.992177 kernel: audit: type=1400 audit(1734103798.590:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.992221 kernel: audit: type=1400 audit(1734103798.590:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:59.116814 kernel: audit: type=1400 audit(1734103798.590:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:59.116867 kernel: audit: type=1400 audit(1734103798.590:666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:59.240665 kernel: audit: type=1400 audit(1734103798.680:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.680000 audit: BPF prog-id=105 op=LOAD Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3188 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:58.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323734306464376232363366666233383066336435346436346631 Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3188 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:58.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323734306464376232363366666233383066336435346436346631 Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.681000 audit: BPF prog-id=106 op=LOAD Dec 13 15:29:58.681000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c0130 items=0 ppid=3188 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:58.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323734306464376232363366666233383066336435346436346631 Dec 13 15:29:58.804000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.804000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.804000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.804000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.804000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.804000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.804000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.804000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.804000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.804000 audit: BPF prog-id=107 op=LOAD Dec 13 15:29:58.804000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c0178 items=0 ppid=3188 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:58.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323734306464376232363366666233383066336435346436346631 Dec 13 15:29:58.929000 audit: BPF prog-id=107 op=UNLOAD Dec 13 15:29:58.929000 audit: BPF prog-id=106 op=UNLOAD Dec 13 15:29:58.929000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.929000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.929000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.929000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.929000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.929000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.929000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.929000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.929000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.929000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:29:58.929000 audit: BPF prog-id=108 op=LOAD Dec 13 15:29:58.929000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0588 items=0 ppid=3188 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:58.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323734306464376232363366666233383066336435346436346631 Dec 13 15:29:59.245562 env[1553]: time="2024-12-13T15:29:59.245486900Z" level=info msg="StartContainer for \"912740dd7b263ffb380f3d54d64f14d5e48860a090d3142b4bcafa83cbaa79b2\" returns successfully" Dec 13 15:29:59.367591 kubelet[1908]: E1213 15:29:59.367464 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:29:59.614201 kubelet[1908]: I1213 15:29:59.614076 1908 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-pf4tc" podStartSLOduration=15.834679031 podStartE2EDuration="20.614035466s" podCreationTimestamp="2024-12-13 15:29:39 +0000 UTC" firstStartedPulling="2024-12-13 15:29:53.762091954 +0000 UTC m=+30.711772141" lastFinishedPulling="2024-12-13 15:29:58.541448393 +0000 UTC m=+35.491128576" observedRunningTime="2024-12-13 15:29:59.614037626 +0000 UTC m=+36.563717874" watchObservedRunningTime="2024-12-13 15:29:59.614035466 +0000 UTC m=+36.563715710" Dec 13 15:30:00.368293 kubelet[1908]: E1213 15:30:00.368177 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:00.511959 env[1553]: time="2024-12-13T15:30:00.511931839Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:00.512568 env[1553]: time="2024-12-13T15:30:00.512534556Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:00.513277 env[1553]: time="2024-12-13T15:30:00.513266462Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:00.514322 env[1553]: time="2024-12-13T15:30:00.514286828Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:00.514534 env[1553]: time="2024-12-13T15:30:00.514504364Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 15:30:00.515774 env[1553]: time="2024-12-13T15:30:00.515731858Z" level=info msg="CreateContainer within sandbox \"f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 15:30:00.520467 env[1553]: time="2024-12-13T15:30:00.520452206Z" level=info msg="CreateContainer within sandbox \"f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"dd8e8b37252d338069ecadd7bb1ba9339e8f414898bbc9c245e4a327042ec4ce\"" Dec 13 15:30:00.520827 env[1553]: time="2024-12-13T15:30:00.520769172Z" level=info msg="StartContainer for \"dd8e8b37252d338069ecadd7bb1ba9339e8f414898bbc9c245e4a327042ec4ce\"" Dec 13 15:30:00.532155 systemd[1]: Started cri-containerd-dd8e8b37252d338069ecadd7bb1ba9339e8f414898bbc9c245e4a327042ec4ce.scope. Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7498461578 items=0 ppid=3057 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:00.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464386538623337323532643333383036396563616464376262316261 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit: BPF prog-id=109 op=LOAD Dec 13 15:30:00.537000 audit[3350]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003246c8 items=0 ppid=3057 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:00.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464386538623337323532643333383036396563616464376262316261 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit: BPF prog-id=110 op=LOAD Dec 13 15:30:00.537000 audit[3350]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000324718 items=0 ppid=3057 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:00.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464386538623337323532643333383036396563616464376262316261 Dec 13 15:30:00.537000 audit: BPF prog-id=110 op=UNLOAD Dec 13 15:30:00.537000 audit: BPF prog-id=109 op=UNLOAD Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { perfmon } for pid=3350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit[3350]: AVC avc: denied { bpf } for pid=3350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:00.537000 audit: BPF prog-id=111 op=LOAD Dec 13 15:30:00.537000 audit[3350]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003247a8 items=0 ppid=3057 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:00.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464386538623337323532643333383036396563616464376262316261 Dec 13 15:30:00.545230 env[1553]: time="2024-12-13T15:30:00.545207445Z" level=info msg="StartContainer for \"dd8e8b37252d338069ecadd7bb1ba9339e8f414898bbc9c245e4a327042ec4ce\" returns successfully" Dec 13 15:30:00.629409 kubelet[1908]: I1213 15:30:00.629185 1908 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-db4v6" podStartSLOduration=30.648813495 podStartE2EDuration="37.629148658s" podCreationTimestamp="2024-12-13 15:29:23 +0000 UTC" firstStartedPulling="2024-12-13 15:29:53.534648343 +0000 UTC m=+30.484328527" lastFinishedPulling="2024-12-13 15:30:00.514983504 +0000 UTC m=+37.464663690" observedRunningTime="2024-12-13 15:30:00.629038691 +0000 UTC m=+37.578718939" watchObservedRunningTime="2024-12-13 15:30:00.629148658 +0000 UTC m=+37.578828892" Dec 13 15:30:01.369390 kubelet[1908]: E1213 15:30:01.369276 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:01.431887 kubelet[1908]: I1213 15:30:01.431797 1908 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 15:30:01.431887 kubelet[1908]: I1213 15:30:01.431865 1908 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 15:30:02.370054 kubelet[1908]: E1213 15:30:02.369938 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:02.832000 audit[3387]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:30:02.832000 audit[3387]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffef06e17c0 a2=0 a3=7ffef06e17ac items=0 ppid=2132 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:02.832000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:30:02.842000 audit[3387]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:30:02.842000 audit[3387]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffef06e17c0 a2=0 a3=0 items=0 ppid=2132 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:02.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:30:02.844878 systemd[1]: Created slice kubepods-besteffort-pod1d7ff227_d958_493a_aee8_ee2076b84aa3.slice. Dec 13 15:30:02.857000 audit[3391]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=3391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:30:02.857000 audit[3391]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe49c209f0 a2=0 a3=7ffe49c209dc items=0 ppid=2132 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:02.857000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:30:02.867000 audit[3391]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=3391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:30:02.867000 audit[3391]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe49c209f0 a2=0 a3=0 items=0 ppid=2132 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:02.867000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:30:02.934661 kubelet[1908]: I1213 15:30:02.934557 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/1d7ff227-d958-493a-aee8-ee2076b84aa3-data\") pod \"nfs-server-provisioner-0\" (UID: \"1d7ff227-d958-493a-aee8-ee2076b84aa3\") " pod="default/nfs-server-provisioner-0" Dec 13 15:30:02.934988 kubelet[1908]: I1213 15:30:02.934694 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-64nfk\" (UniqueName: \"kubernetes.io/projected/1d7ff227-d958-493a-aee8-ee2076b84aa3-kube-api-access-64nfk\") pod \"nfs-server-provisioner-0\" (UID: \"1d7ff227-d958-493a-aee8-ee2076b84aa3\") " pod="default/nfs-server-provisioner-0" Dec 13 15:30:03.149251 env[1553]: time="2024-12-13T15:30:03.149006070Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:1d7ff227-d958-493a-aee8-ee2076b84aa3,Namespace:default,Attempt:0,}" Dec 13 15:30:03.282444 systemd-networkd[1306]: cali60e51b789ff: Link UP Dec 13 15:30:03.338875 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:30:03.338963 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 15:30:03.339147 systemd-networkd[1306]: cali60e51b789ff: Gained carrier Dec 13 15:30:03.344367 kubelet[1908]: E1213 15:30:03.344253 1908 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.187 [INFO][3395] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 1d7ff227-d958-493a-aee8-ee2076b84aa3 1705 0 2024-12-13 15:30:02 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.80.21 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.187 [INFO][3395] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.219 [INFO][3417] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" HandleID="k8s-pod-network.0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" Workload="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.231 [INFO][3417] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" HandleID="k8s-pod-network.0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" Workload="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f8040), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.21", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 15:30:03.219181064 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.231 [INFO][3417] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.231 [INFO][3417] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.231 [INFO][3417] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.234 [INFO][3417] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" host="10.67.80.21" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.239 [INFO][3417] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.248 [INFO][3417] ipam/ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.251 [INFO][3417] ipam/ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.253 [INFO][3417] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.253 [INFO][3417] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" host="10.67.80.21" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.255 [INFO][3417] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340 Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.264 [INFO][3417] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" host="10.67.80.21" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.275 [INFO][3417] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.115.3/26] block=192.168.115.0/26 handle="k8s-pod-network.0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" host="10.67.80.21" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.275 [INFO][3417] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.3/26] handle="k8s-pod-network.0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" host="10.67.80.21" Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.275 [INFO][3417] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:30:03.356234 env[1553]: 2024-12-13 15:30:03.275 [INFO][3417] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.115.3/26] IPv6=[] ContainerID="0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" HandleID="k8s-pod-network.0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" Workload="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:30:03.358036 env[1553]: 2024-12-13 15:30:03.279 [INFO][3395] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"1d7ff227-d958-493a-aee8-ee2076b84aa3", ResourceVersion:"1705", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 30, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.115.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:30:03.358036 env[1553]: 2024-12-13 15:30:03.279 [INFO][3395] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.115.3/32] ContainerID="0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:30:03.358036 env[1553]: 2024-12-13 15:30:03.279 [INFO][3395] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:30:03.358036 env[1553]: 2024-12-13 15:30:03.339 [INFO][3395] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:30:03.358552 env[1553]: 2024-12-13 15:30:03.339 [INFO][3395] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"1d7ff227-d958-493a-aee8-ee2076b84aa3", ResourceVersion:"1705", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 30, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.115.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"82:23:81:51:17:01", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:30:03.358552 env[1553]: 2024-12-13 15:30:03.353 [INFO][3395] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 15:30:03.370852 kubelet[1908]: E1213 15:30:03.370802 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:03.375309 env[1553]: time="2024-12-13T15:30:03.375137112Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:30:03.375309 env[1553]: time="2024-12-13T15:30:03.375208040Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:30:03.375309 env[1553]: time="2024-12-13T15:30:03.375235578Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:30:03.375610 env[1553]: time="2024-12-13T15:30:03.375466617Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340 pid=3457 runtime=io.containerd.runc.v2 Dec 13 15:30:03.375000 audit[3458]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=3458 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:30:03.375000 audit[3458]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fffadd2b2a0 a2=0 a3=7fffadd2b28c items=0 ppid=2621 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:03.375000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:30:03.400445 systemd[1]: Started cri-containerd-0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340.scope. Dec 13 15:30:03.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.417000 audit: BPF prog-id=112 op=LOAD Dec 13 15:30:03.417000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.417000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:03.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030343332313664346237363136303733363265636634396135383364 Dec 13 15:30:03.417000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.417000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:03.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030343332313664346237363136303733363265636634396135383364 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit: BPF prog-id=113 op=LOAD Dec 13 15:30:03.418000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003f2000 items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:03.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030343332313664346237363136303733363265636634396135383364 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit: BPF prog-id=114 op=LOAD Dec 13 15:30:03.418000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003f2048 items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:03.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030343332313664346237363136303733363265636634396135383364 Dec 13 15:30:03.418000 audit: BPF prog-id=114 op=UNLOAD Dec 13 15:30:03.418000 audit: BPF prog-id=113 op=UNLOAD Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:03.418000 audit: BPF prog-id=115 op=LOAD Dec 13 15:30:03.418000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003f2458 items=0 ppid=3457 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:03.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030343332313664346237363136303733363265636634396135383364 Dec 13 15:30:03.459741 env[1553]: time="2024-12-13T15:30:03.459705990Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:1d7ff227-d958-493a-aee8-ee2076b84aa3,Namespace:default,Attempt:0,} returns sandbox id \"0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340\"" Dec 13 15:30:03.460704 env[1553]: time="2024-12-13T15:30:03.460655122Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 15:30:04.371361 kubelet[1908]: E1213 15:30:04.371300 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:04.937757 systemd-networkd[1306]: cali60e51b789ff: Gained IPv6LL Dec 13 15:30:05.372463 kubelet[1908]: E1213 15:30:05.372421 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:05.786336 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1918553399.mount: Deactivated successfully. Dec 13 15:30:06.373233 kubelet[1908]: E1213 15:30:06.373182 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:06.969977 env[1553]: time="2024-12-13T15:30:06.969922905Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:06.971609 env[1553]: time="2024-12-13T15:30:06.971572789Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:06.972808 env[1553]: time="2024-12-13T15:30:06.972764116Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:06.973772 env[1553]: time="2024-12-13T15:30:06.973724033Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:06.974567 env[1553]: time="2024-12-13T15:30:06.974530996Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 15:30:06.975983 env[1553]: time="2024-12-13T15:30:06.975941260Z" level=info msg="CreateContainer within sandbox \"0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 15:30:06.980832 env[1553]: time="2024-12-13T15:30:06.980794924Z" level=info msg="CreateContainer within sandbox \"0043216d4b761607362ecf49a583d7229f70254a31f8ef596cc233a1e1357340\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"8b9138d6707c39db63883de85abf879dd64025a11a657d7e4282fac1a6075ed2\"" Dec 13 15:30:06.981057 env[1553]: time="2024-12-13T15:30:06.981034313Z" level=info msg="StartContainer for \"8b9138d6707c39db63883de85abf879dd64025a11a657d7e4282fac1a6075ed2\"" Dec 13 15:30:06.982011 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1067463771.mount: Deactivated successfully. Dec 13 15:30:06.990771 systemd[1]: Started cri-containerd-8b9138d6707c39db63883de85abf879dd64025a11a657d7e4282fac1a6075ed2.scope. Dec 13 15:30:06.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.023852 kernel: kauditd_printk_skb: 162 callbacks suppressed Dec 13 15:30:07.023971 kernel: audit: type=1400 audit(1734103806.996:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:06.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149983 kernel: audit: type=1400 audit(1734103806.996:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.150036 kernel: audit: type=1400 audit(1734103806.996:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:06.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:06.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.274902 kernel: audit: type=1400 audit(1734103806.996:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.274960 kernel: audit: type=1400 audit(1734103806.996:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:06.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:06.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.373804 kubelet[1908]: E1213 15:30:07.373781 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:07.402752 kernel: audit: type=1400 audit(1734103806.996:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.402850 kernel: audit: type=1400 audit(1734103806.996:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:06.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:06.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.529448 kernel: audit: type=1400 audit(1734103806.996:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.529493 kernel: audit: type=1400 audit(1734103806.996:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:06.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.655814 kernel: audit: type=1400 audit(1734103807.149:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit: BPF prog-id=116 op=LOAD Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3457 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:07.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393133386436373037633339646236333838336465383561626638 Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3457 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:07.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393133386436373037633339646236333838336465383561626638 Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.149000 audit: BPF prog-id=117 op=LOAD Dec 13 15:30:07.149000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000286ef0 items=0 ppid=3457 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:07.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393133386436373037633339646236333838336465383561626638 Dec 13 15:30:07.274000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.274000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.274000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.274000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.274000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.274000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.274000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.274000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.274000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.274000 audit: BPF prog-id=118 op=LOAD Dec 13 15:30:07.274000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000286f38 items=0 ppid=3457 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:07.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393133386436373037633339646236333838336465383561626638 Dec 13 15:30:07.402000 audit: BPF prog-id=118 op=UNLOAD Dec 13 15:30:07.402000 audit: BPF prog-id=117 op=UNLOAD Dec 13 15:30:07.402000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.402000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.402000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.402000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.402000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.402000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.402000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.402000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.402000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.402000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:07.402000 audit: BPF prog-id=119 op=LOAD Dec 13 15:30:07.402000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000287348 items=0 ppid=3457 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:07.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393133386436373037633339646236333838336465383561626638 Dec 13 15:30:07.661175 env[1553]: time="2024-12-13T15:30:07.661136163Z" level=info msg="StartContainer for \"8b9138d6707c39db63883de85abf879dd64025a11a657d7e4282fac1a6075ed2\" returns successfully" Dec 13 15:30:07.686000 audit[3537]: AVC avc: denied { search } for pid=3537 comm="rpcbind" name="crypto" dev="proc" ino=34902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c943 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 15:30:07.686000 audit[3537]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f55ccac60c0 a2=0 a3=0 items=0 ppid=3517 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c943 key=(null) Dec 13 15:30:07.686000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 15:30:07.705000 audit[3542]: AVC avc: denied { search } for pid=3542 comm="dbus-daemon" name="crypto" dev="proc" ino=34902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c943 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 15:30:07.705000 audit[3542]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fde6afb90c0 a2=0 a3=0 items=0 ppid=3517 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c943 key=(null) Dec 13 15:30:07.705000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 15:30:07.706000 audit[3543]: AVC avc: denied { watch } for pid=3543 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538701 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c943 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c14,c943 tclass=dir permissive=0 Dec 13 15:30:07.706000 audit[3543]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5648525e4040 a2=2c8 a3=7ffc3c9c1cdc items=0 ppid=3517 pid=3543 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c943 key=(null) Dec 13 15:30:07.706000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 15:30:07.724000 audit[3544]: AVC avc: denied { read } for pid=3544 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=28445 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c943 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 15:30:07.724000 audit[3544]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f2c5c2bb320 a1=80000 a2=d a3=7ffc487b8350 items=0 ppid=3517 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c943 key=(null) Dec 13 15:30:07.724000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 15:30:07.725000 audit[3544]: AVC avc: denied { search } for pid=3544 comm="ganesha.nfsd" name="crypto" dev="proc" ino=34902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c943 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 15:30:07.725000 audit[3544]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2c5b80f0c0 a2=0 a3=0 items=0 ppid=3517 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c943 key=(null) Dec 13 15:30:07.725000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 15:30:08.375018 kubelet[1908]: E1213 15:30:08.374902 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:08.639641 kubelet[1908]: I1213 15:30:08.639358 1908 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=3.124664226 podStartE2EDuration="6.639322946s" podCreationTimestamp="2024-12-13 15:30:02 +0000 UTC" firstStartedPulling="2024-12-13 15:30:03.460446421 +0000 UTC m=+40.410126614" lastFinishedPulling="2024-12-13 15:30:06.975105151 +0000 UTC m=+43.924785334" observedRunningTime="2024-12-13 15:30:08.638805461 +0000 UTC m=+45.588485797" watchObservedRunningTime="2024-12-13 15:30:08.639322946 +0000 UTC m=+45.589003175" Dec 13 15:30:08.740000 audit[3564]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3564 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:30:08.740000 audit[3564]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff8f606c60 a2=0 a3=7fff8f606c4c items=0 ppid=2132 pid=3564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:08.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:30:08.751000 audit[3564]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3564 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:30:08.751000 audit[3564]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff8f606c60 a2=0 a3=7fff8f606c4c items=0 ppid=2132 pid=3564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:08.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:30:09.375582 kubelet[1908]: E1213 15:30:09.375518 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:10.376127 kubelet[1908]: E1213 15:30:10.376009 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:11.377027 kubelet[1908]: E1213 15:30:11.376904 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:12.377560 kubelet[1908]: E1213 15:30:12.377440 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:13.377849 kubelet[1908]: E1213 15:30:13.377719 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:14.378767 kubelet[1908]: E1213 15:30:14.378653 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:15.379663 kubelet[1908]: E1213 15:30:15.379531 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:16.380809 kubelet[1908]: E1213 15:30:16.380689 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:17.002223 systemd[1]: Created slice kubepods-besteffort-podda53176f_6894_430b_8a02_c0734bbdc1ef.slice. Dec 13 15:30:17.042489 kubelet[1908]: I1213 15:30:17.042367 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-b4f3ad43-c43f-4374-8e35-f3baccec9255\" (UniqueName: \"kubernetes.io/nfs/da53176f-6894-430b-8a02-c0734bbdc1ef-pvc-b4f3ad43-c43f-4374-8e35-f3baccec9255\") pod \"test-pod-1\" (UID: \"da53176f-6894-430b-8a02-c0734bbdc1ef\") " pod="default/test-pod-1" Dec 13 15:30:17.042489 kubelet[1908]: I1213 15:30:17.042468 1908 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z5c9g\" (UniqueName: \"kubernetes.io/projected/da53176f-6894-430b-8a02-c0734bbdc1ef-kube-api-access-z5c9g\") pod \"test-pod-1\" (UID: \"da53176f-6894-430b-8a02-c0734bbdc1ef\") " pod="default/test-pod-1" Dec 13 15:30:17.159000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.188479 kernel: Failed to create system directory netfs Dec 13 15:30:17.188540 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 15:30:17.188576 kernel: audit: type=1400 audit(1734103817.159:730): avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.188613 kernel: Failed to create system directory netfs Dec 13 15:30:17.159000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.301627 kernel: audit: type=1400 audit(1734103817.159:730): avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.301693 kernel: Failed to create system directory netfs Dec 13 15:30:17.159000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.381121 kubelet[1908]: E1213 15:30:17.381109 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:17.411272 kernel: audit: type=1400 audit(1734103817.159:730): avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.411326 kernel: Failed to create system directory netfs Dec 13 15:30:17.159000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.519614 kernel: audit: type=1400 audit(1734103817.159:730): avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.159000 audit[3583]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564bd5f855e0 a1=153bc a2=564bcffca2b0 a3=5 items=0 ppid=624 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:17.159000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:30:17.748612 kernel: audit: type=1300 audit(1734103817.159:730): arch=c000003e syscall=175 success=yes exit=0 a0=564bd5f855e0 a1=153bc a2=564bcffca2b0 a3=5 items=0 ppid=624 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:17.748643 kernel: audit: type=1327 audit(1734103817.159:730): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.855355 kernel: Failed to create system directory fscache Dec 13 15:30:17.855380 kernel: audit: type=1400 audit(1734103817.628:731): avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.855397 kernel: Failed to create system directory fscache Dec 13 15:30:17.855409 kernel: audit: type=1400 audit(1734103817.628:731): avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.963671 kernel: Failed to create system directory fscache Dec 13 15:30:17.963697 kernel: audit: type=1400 audit(1734103817.628:731): avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.069498 kernel: Failed to create system directory fscache Dec 13 15:30:18.069527 kernel: audit: type=1400 audit(1734103817.628:731): avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.199179 kernel: Failed to create system directory fscache Dec 13 15:30:18.199209 kernel: Failed to create system directory fscache Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.222835 kernel: Failed to create system directory fscache Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.246062 kernel: Failed to create system directory fscache Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.269031 kernel: Failed to create system directory fscache Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.291293 kernel: Failed to create system directory fscache Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.313147 kernel: Failed to create system directory fscache Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.334510 kernel: Failed to create system directory fscache Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.355572 kernel: Failed to create system directory fscache Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.376056 kernel: Failed to create system directory fscache Dec 13 15:30:17.628000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.381215 kubelet[1908]: E1213 15:30:18.381168 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:18.415635 kernel: FS-Cache: Loaded Dec 13 15:30:17.628000 audit[3583]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564bd619a9c0 a1=4c0fc a2=564bcffca2b0 a3=5 items=0 ppid=624 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:17.628000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.495594 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.495668 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.495682 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.514524 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.533021 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.551349 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.569287 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.586835 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.603943 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.620884 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.637474 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.653723 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.669446 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.684991 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.700161 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.714905 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.729204 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.743054 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.756503 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.769495 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.782056 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.794228 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.806042 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.817419 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.828352 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.839100 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.849511 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.859523 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.869060 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.878423 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.887468 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.896027 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.904134 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.912081 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.919676 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.926842 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.933532 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.940086 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.946604 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.953121 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.959657 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.966182 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.979280 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.979305 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.985815 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.992351 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:18.998841 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.005229 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.011492 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.017770 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.024033 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.030293 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.036554 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.042810 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.049058 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.055300 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.061541 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.067784 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.074017 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.080268 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.086504 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.092745 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.099017 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.105256 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.111484 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.117693 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.123987 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.130250 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.136468 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.142756 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.149017 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.155272 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.161498 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.167758 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.173987 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.180231 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.186466 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.192713 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.199008 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.205241 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.211477 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.217768 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.224001 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.230229 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.236507 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.242744 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.249001 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.255265 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.261497 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.267722 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.273996 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.280246 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.286473 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.292684 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.299034 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.305260 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.311492 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.317789 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.324015 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.330252 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.336489 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.342698 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.349030 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.355282 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.361526 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.367759 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.373981 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.380229 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.381378 kubelet[1908]: E1213 15:30:19.381329 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:19.386464 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.392660 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.398927 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.405158 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.411397 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.417619 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.423868 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.430096 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.436332 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.442560 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.448856 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.455113 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.461343 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.467567 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.473787 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.480011 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.486231 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.492462 kernel: Failed to create system directory sunrpc Dec 13 15:30:18.446000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.518823 kernel: RPC: Registered named UNIX socket transport module. Dec 13 15:30:19.518854 kernel: RPC: Registered udp transport module. Dec 13 15:30:19.518869 kernel: RPC: Registered tcp transport module. Dec 13 15:30:19.525093 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 15:30:18.446000 audit[3583]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564bd61e6ad0 a1=1a7f1c a2=564bcffca2b0 a3=5 items=6 ppid=624 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:18.446000 audit: CWD cwd="/" Dec 13 15:30:18.446000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:30:18.446000 audit: PATH item=1 name=(null) inode=30291 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:30:18.446000 audit: PATH item=2 name=(null) inode=30291 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:30:18.446000 audit: PATH item=3 name=(null) inode=30292 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:30:18.446000 audit: PATH item=4 name=(null) inode=30291 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:30:18.446000 audit: PATH item=5 name=(null) inode=30293 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:30:18.446000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.573086 kernel: Failed to create system directory nfs Dec 13 15:30:19.573154 kernel: Failed to create system directory nfs Dec 13 15:30:19.573169 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.579710 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.586313 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.592934 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.599555 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.606182 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.612795 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.619417 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.626046 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.632663 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.639285 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.645911 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.652562 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.659151 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.665800 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.672406 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.679047 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.685664 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.692305 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.698932 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.705546 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.712198 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.718803 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.725442 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.732064 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.738707 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.745394 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.752058 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.758704 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.765438 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.772052 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.778663 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.785291 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.791931 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.798543 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.805189 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.811841 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.818476 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.825100 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.831726 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.838349 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.844945 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.851388 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.857755 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.864054 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.870225 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.876184 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.882160 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.888123 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.894077 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.900040 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.905980 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.911961 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.917884 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.923829 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.929772 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.935718 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.941680 kernel: Failed to create system directory nfs Dec 13 15:30:19.554000 audit[3583]: AVC avc: denied { confidentiality } for pid=3583 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.967620 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 15:30:19.554000 audit[3583]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564bd6407700 a1=16e97c a2=564bcffca2b0 a3=5 items=0 ppid=624 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:19.554000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.006760 kernel: Failed to create system directory nfs4 Dec 13 15:30:20.006791 kernel: Failed to create system directory nfs4 Dec 13 15:30:20.006807 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.013088 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.019404 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.025725 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.032044 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.038357 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.044651 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.050981 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.057297 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.063602 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.069934 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.076240 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.082553 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.088878 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.095191 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.101512 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.107828 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.114137 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.120456 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.126771 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.133087 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.139409 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.145729 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.152045 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.158364 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.164650 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.171009 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.177331 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.183692 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.189985 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.196314 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.202643 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.208982 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.215309 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.221642 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.227985 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.234319 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.240662 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.246998 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.253337 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.259652 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.266031 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.272384 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.278728 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.285100 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.291315 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.297359 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.303420 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.309500 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.315586 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.321632 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.327650 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.333748 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.339806 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.345866 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.351970 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.358044 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.364154 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.370194 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.376240 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.381424 kubelet[1908]: E1213 15:30:20.381372 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:20.382308 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.388371 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.394410 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.400467 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.406501 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.412541 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.418570 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.424602 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.430626 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.436658 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.442657 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.448681 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.454668 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.460666 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.466667 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.472659 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.478665 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.484662 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.490636 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.496609 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.502571 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.508535 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.514492 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.520454 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.526416 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.532379 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.538317 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.544276 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.550221 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.556162 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.562123 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.568047 kernel: Failed to create system directory nfs4 Dec 13 15:30:19.985000 audit[3588]: AVC avc: denied { confidentiality } for pid=3588 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.675508 kernel: NFS: Registering the id_resolver key type Dec 13 15:30:20.675538 kernel: Key type id_resolver registered Dec 13 15:30:20.675551 kernel: Key type id_legacy registered Dec 13 15:30:19.985000 audit[3588]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa5f254a010 a1=208de4 a2=556dfd3fb2b0 a3=5 items=0 ppid=624 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:19.985000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.702920 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.702971 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.702984 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.709549 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.716213 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.722909 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.729571 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.736275 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.742964 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.749626 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.756322 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.762994 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.769667 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.776388 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.783096 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.789686 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.796333 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.802962 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.809592 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.816224 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.822864 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.829517 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.836160 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.842810 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.849477 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.856125 kernel: Failed to create system directory rpcgss Dec 13 15:30:20.686000 audit[3589]: AVC avc: denied { confidentiality } for pid=3589 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:30:20.686000 audit[3589]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f6835808010 a1=70af4 a2=55a78dad52b0 a3=5 items=0 ppid=624 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:20.686000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 15:30:20.878848 nfsidmap[3597]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-e598f10d4d' Dec 13 15:30:21.035270 nfsidmap[3598]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-e598f10d4d' Dec 13 15:30:21.059000 audit[1643]: AVC avc: denied { watch_reads } for pid=1643 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3108 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:30:21.059000 audit[1643]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555988c40a00 a2=10 a3=fff3a670b369b3d0 items=0 ppid=1 pid=1643 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:21.059000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3108 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:30:21.059000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 15:30:21.059000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3108 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:30:21.059000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3108 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:30:21.059000 audit[1643]: AVC avc: denied { watch_reads } for pid=1643 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3108 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:30:21.059000 audit[1643]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555988c40a00 a2=10 a3=fff3a670b369b3d0 items=0 ppid=1 pid=1643 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:21.059000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 15:30:21.059000 audit[1643]: AVC avc: denied { watch_reads } for pid=1643 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3108 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 15:30:21.059000 audit[1643]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555988c40a00 a2=10 a3=fff3a670b369b3d0 items=0 ppid=1 pid=1643 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:21.059000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 15:30:21.208735 env[1553]: time="2024-12-13T15:30:21.208595253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:da53176f-6894-430b-8a02-c0734bbdc1ef,Namespace:default,Attempt:0,}" Dec 13 15:30:21.381795 kubelet[1908]: E1213 15:30:21.381600 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:21.385948 systemd-networkd[1306]: cali5ec59c6bf6e: Link UP Dec 13 15:30:21.404006 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:30:21.404083 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 15:30:21.404260 systemd-networkd[1306]: cali5ec59c6bf6e: Gained carrier Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.255 [INFO][3599] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-test--pod--1-eth0 default da53176f-6894-430b-8a02-c0734bbdc1ef 1763 0 2024-12-13 15:30:03 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.21 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.255 [INFO][3599] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.302 [INFO][3616] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" HandleID="k8s-pod-network.4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" Workload="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.323 [INFO][3616] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" HandleID="k8s-pod-network.4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" Workload="10.67.80.21-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003ca690), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.21", "pod":"test-pod-1", "timestamp":"2024-12-13 15:30:21.302885823 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.323 [INFO][3616] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.323 [INFO][3616] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.323 [INFO][3616] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.328 [INFO][3616] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" host="10.67.80.21" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.337 [INFO][3616] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.346 [INFO][3616] ipam/ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.350 [INFO][3616] ipam/ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.356 [INFO][3616] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.356 [INFO][3616] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" host="10.67.80.21" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.360 [INFO][3616] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.367 [INFO][3616] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" host="10.67.80.21" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.379 [INFO][3616] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.115.4/26] block=192.168.115.0/26 handle="k8s-pod-network.4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" host="10.67.80.21" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.379 [INFO][3616] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.4/26] handle="k8s-pod-network.4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" host="10.67.80.21" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.379 [INFO][3616] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.379 [INFO][3616] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.115.4/26] IPv6=[] ContainerID="4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" HandleID="k8s-pod-network.4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" Workload="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 15:30:21.415390 env[1553]: 2024-12-13 15:30:21.382 [INFO][3599] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"da53176f-6894-430b-8a02-c0734bbdc1ef", ResourceVersion:"1763", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 30, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:30:21.416052 env[1553]: 2024-12-13 15:30:21.382 [INFO][3599] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.115.4/32] ContainerID="4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 15:30:21.416052 env[1553]: 2024-12-13 15:30:21.383 [INFO][3599] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 15:30:21.416052 env[1553]: 2024-12-13 15:30:21.404 [INFO][3599] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 15:30:21.416052 env[1553]: 2024-12-13 15:30:21.404 [INFO][3599] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"da53176f-6894-430b-8a02-c0734bbdc1ef", ResourceVersion:"1763", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 30, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"76:7c:77:74:f9:cd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:30:21.416052 env[1553]: 2024-12-13 15:30:21.414 [INFO][3599] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 15:30:21.421581 env[1553]: time="2024-12-13T15:30:21.421515709Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:30:21.421581 env[1553]: time="2024-12-13T15:30:21.421535809Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:30:21.421581 env[1553]: time="2024-12-13T15:30:21.421542473Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:30:21.421733 env[1553]: time="2024-12-13T15:30:21.421605371Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d pid=3651 runtime=io.containerd.runc.v2 Dec 13 15:30:21.421000 audit[3659]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3659 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:30:21.421000 audit[3659]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffd892a27a0 a2=0 a3=7ffd892a278c items=0 ppid=2621 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:21.421000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:30:21.427357 systemd[1]: Started cri-containerd-4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d.scope. Dec 13 15:30:21.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit: BPF prog-id=120 op=LOAD Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3651 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:21.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464323362663564313366343333626366303664323662313561313264 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3651 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:21.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464323362663564313366343333626366303664323662313561313264 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit: BPF prog-id=121 op=LOAD Dec 13 15:30:21.434000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000323a70 items=0 ppid=3651 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:21.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464323362663564313366343333626366303664323662313561313264 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit: BPF prog-id=122 op=LOAD Dec 13 15:30:21.434000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000323ab8 items=0 ppid=3651 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:21.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464323362663564313366343333626366303664323662313561313264 Dec 13 15:30:21.434000 audit: BPF prog-id=122 op=UNLOAD Dec 13 15:30:21.434000 audit: BPF prog-id=121 op=UNLOAD Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:21.434000 audit: BPF prog-id=123 op=LOAD Dec 13 15:30:21.434000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000323ec8 items=0 ppid=3651 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:21.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464323362663564313366343333626366303664323662313561313264 Dec 13 15:30:21.451098 env[1553]: time="2024-12-13T15:30:21.451074653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:da53176f-6894-430b-8a02-c0734bbdc1ef,Namespace:default,Attempt:0,} returns sandbox id \"4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d\"" Dec 13 15:30:21.451790 env[1553]: time="2024-12-13T15:30:21.451777171Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 15:30:22.096494 env[1553]: time="2024-12-13T15:30:22.096433299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:22.097161 env[1553]: time="2024-12-13T15:30:22.097119198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:22.098231 env[1553]: time="2024-12-13T15:30:22.098174673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:22.099243 env[1553]: time="2024-12-13T15:30:22.099194950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:30:22.100149 env[1553]: time="2024-12-13T15:30:22.100105131Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 15:30:22.101665 env[1553]: time="2024-12-13T15:30:22.101618588Z" level=info msg="CreateContainer within sandbox \"4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 15:30:22.106423 env[1553]: time="2024-12-13T15:30:22.106381764Z" level=info msg="CreateContainer within sandbox \"4d23bf5d13f433bcf06d26b15a12d02234247135abef52dfa60fe849aa41a23d\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"66fdfe75054b3f316d33f8f9b17134cf3bbda5feb9da7ca898739a8bcfc5bd1a\"" Dec 13 15:30:22.106625 env[1553]: time="2024-12-13T15:30:22.106603745Z" level=info msg="StartContainer for \"66fdfe75054b3f316d33f8f9b17134cf3bbda5feb9da7ca898739a8bcfc5bd1a\"" Dec 13 15:30:22.116260 systemd[1]: Started cri-containerd-66fdfe75054b3f316d33f8f9b17134cf3bbda5feb9da7ca898739a8bcfc5bd1a.scope. Dec 13 15:30:22.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit: BPF prog-id=124 op=LOAD Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3651 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:22.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636666466653735303534623366333136643333663866396231373133 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3651 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:22.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636666466653735303534623366333136643333663866396231373133 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit: BPF prog-id=125 op=LOAD Dec 13 15:30:22.120000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d7d10 items=0 ppid=3651 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:22.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636666466653735303534623366333136643333663866396231373133 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.120000 audit: BPF prog-id=126 op=LOAD Dec 13 15:30:22.120000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d7d58 items=0 ppid=3651 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:22.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636666466653735303534623366333136643333663866396231373133 Dec 13 15:30:22.120000 audit: BPF prog-id=126 op=UNLOAD Dec 13 15:30:22.121000 audit: BPF prog-id=125 op=UNLOAD Dec 13 15:30:22.121000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.121000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.121000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.121000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.121000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.121000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.121000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.121000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.121000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.121000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:30:22.121000 audit: BPF prog-id=127 op=LOAD Dec 13 15:30:22.121000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003be168 items=0 ppid=3651 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:30:22.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636666466653735303534623366333136643333663866396231373133 Dec 13 15:30:22.128541 env[1553]: time="2024-12-13T15:30:22.128512026Z" level=info msg="StartContainer for \"66fdfe75054b3f316d33f8f9b17134cf3bbda5feb9da7ca898739a8bcfc5bd1a\" returns successfully" Dec 13 15:30:22.382309 kubelet[1908]: E1213 15:30:22.382086 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:22.681969 kubelet[1908]: I1213 15:30:22.681714 1908 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=19.03257729 podStartE2EDuration="19.681675645s" podCreationTimestamp="2024-12-13 15:30:03 +0000 UTC" firstStartedPulling="2024-12-13 15:30:21.451638122 +0000 UTC m=+58.401318309" lastFinishedPulling="2024-12-13 15:30:22.100736477 +0000 UTC m=+59.050416664" observedRunningTime="2024-12-13 15:30:22.681266613 +0000 UTC m=+59.630946857" watchObservedRunningTime="2024-12-13 15:30:22.681675645 +0000 UTC m=+59.631355875" Dec 13 15:30:22.921958 systemd-networkd[1306]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 15:30:23.344350 kubelet[1908]: E1213 15:30:23.344239 1908 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:23.359424 env[1553]: time="2024-12-13T15:30:23.359349722Z" level=info msg="StopPodSandbox for \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\"" Dec 13 15:30:23.382887 kubelet[1908]: E1213 15:30:23.382866 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.401 [WARNING][3793] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-csi--node--driver--db4v6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3b9a97fb-54b1-484f-901b-65fe950c1956", ResourceVersion:"1680", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 29, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6", Pod:"csi-node-driver-db4v6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.115.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2c805789ba6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.402 [INFO][3793] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.402 [INFO][3793] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" iface="eth0" netns="" Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.402 [INFO][3793] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.402 [INFO][3793] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.417 [INFO][3806] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" HandleID="k8s-pod-network.2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.417 [INFO][3806] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.417 [INFO][3806] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.426 [WARNING][3806] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" HandleID="k8s-pod-network.2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.426 [INFO][3806] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" HandleID="k8s-pod-network.2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.428 [INFO][3806] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:30:23.429518 env[1553]: 2024-12-13 15:30:23.428 [INFO][3793] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:30:23.429518 env[1553]: time="2024-12-13T15:30:23.429506711Z" level=info msg="TearDown network for sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\" successfully" Dec 13 15:30:23.430003 env[1553]: time="2024-12-13T15:30:23.429528102Z" level=info msg="StopPodSandbox for \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\" returns successfully" Dec 13 15:30:23.430003 env[1553]: time="2024-12-13T15:30:23.429890412Z" level=info msg="RemovePodSandbox for \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\"" Dec 13 15:30:23.430003 env[1553]: time="2024-12-13T15:30:23.429910574Z" level=info msg="Forcibly stopping sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\"" Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.457 [WARNING][3831] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-csi--node--driver--db4v6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3b9a97fb-54b1-484f-901b-65fe950c1956", ResourceVersion:"1680", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 29, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"f8881a07aaf59d87e8a87d79304f7e8a9a5b36429a66f7025d0a4f2854442af6", Pod:"csi-node-driver-db4v6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.115.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2c805789ba6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.457 [INFO][3831] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.457 [INFO][3831] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" iface="eth0" netns="" Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.457 [INFO][3831] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.457 [INFO][3831] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.472 [INFO][3847] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" HandleID="k8s-pod-network.2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.472 [INFO][3847] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.472 [INFO][3847] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.479 [WARNING][3847] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" HandleID="k8s-pod-network.2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.479 [INFO][3847] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" HandleID="k8s-pod-network.2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Workload="10.67.80.21-k8s-csi--node--driver--db4v6-eth0" Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.482 [INFO][3847] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:30:23.487271 env[1553]: 2024-12-13 15:30:23.484 [INFO][3831] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f" Dec 13 15:30:23.488752 env[1553]: time="2024-12-13T15:30:23.487273261Z" level=info msg="TearDown network for sandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\" successfully" Dec 13 15:30:23.490715 env[1553]: time="2024-12-13T15:30:23.490642719Z" level=info msg="RemovePodSandbox \"2a4ca9173d2f030185f3550f8c216cb589c63ede7b5f1d20073e7b207811ab6f\" returns successfully" Dec 13 15:30:23.491775 env[1553]: time="2024-12-13T15:30:23.491669283Z" level=info msg="StopPodSandbox for \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\"" Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.561 [WARNING][3876] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"acc911b9-6906-4c9a-aa58-cf3b33bb4dc0", ResourceVersion:"1671", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 29, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4", Pod:"nginx-deployment-8587fbcb89-pf4tc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia982c7b7283", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.561 [INFO][3876] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.561 [INFO][3876] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" iface="eth0" netns="" Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.561 [INFO][3876] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.561 [INFO][3876] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.582 [INFO][3890] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" HandleID="k8s-pod-network.6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.582 [INFO][3890] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.582 [INFO][3890] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.592 [WARNING][3890] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" HandleID="k8s-pod-network.6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.592 [INFO][3890] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" HandleID="k8s-pod-network.6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.594 [INFO][3890] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:30:23.599582 env[1553]: 2024-12-13 15:30:23.596 [INFO][3876] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:30:23.599582 env[1553]: time="2024-12-13T15:30:23.599499010Z" level=info msg="TearDown network for sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\" successfully" Dec 13 15:30:23.599582 env[1553]: time="2024-12-13T15:30:23.599569498Z" level=info msg="StopPodSandbox for \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\" returns successfully" Dec 13 15:30:23.601914 env[1553]: time="2024-12-13T15:30:23.600462746Z" level=info msg="RemovePodSandbox for \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\"" Dec 13 15:30:23.601914 env[1553]: time="2024-12-13T15:30:23.600541517Z" level=info msg="Forcibly stopping sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\"" Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.662 [WARNING][3920] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"acc911b9-6906-4c9a-aa58-cf3b33bb4dc0", ResourceVersion:"1671", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 29, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"165d99c750d8b028b95dc44852a44c55291beb87f739d0f25587e3b9113134c4", Pod:"nginx-deployment-8587fbcb89-pf4tc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia982c7b7283", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.662 [INFO][3920] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.662 [INFO][3920] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" iface="eth0" netns="" Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.662 [INFO][3920] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.662 [INFO][3920] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.679 [INFO][3936] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" HandleID="k8s-pod-network.6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.679 [INFO][3936] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.679 [INFO][3936] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.685 [WARNING][3936] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" HandleID="k8s-pod-network.6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.685 [INFO][3936] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" HandleID="k8s-pod-network.6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Workload="10.67.80.21-k8s-nginx--deployment--8587fbcb89--pf4tc-eth0" Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.686 [INFO][3936] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:30:23.688506 env[1553]: 2024-12-13 15:30:23.687 [INFO][3920] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f" Dec 13 15:30:23.689063 env[1553]: time="2024-12-13T15:30:23.688528655Z" level=info msg="TearDown network for sandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\" successfully" Dec 13 15:30:23.690076 env[1553]: time="2024-12-13T15:30:23.690036930Z" level=info msg="RemovePodSandbox \"6d7f05d0245ec36d615b832ee51829ad6ebbd066d584182a471b187786bbf44f\" returns successfully" Dec 13 15:30:24.383350 kubelet[1908]: E1213 15:30:24.383225 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 15:30:25.383613 kubelet[1908]: E1213 15:30:25.383495 1908 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"